• Title/Summary/Keyword: linear embedding

Search Result 97, Processing Time 0.026 seconds

Probing Sentence Embeddings in L2 Learners' LSTM Neural Language Models Using Adaptation Learning

  • Kim, Euhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.13-23
    • /
    • 2022
  • In this study we leveraged a probing method to evaluate how a pre-trained L2 LSTM language model represents sentences with relative and coordinate clauses. The probing experiment employed adapted models based on the pre-trained L2 language models to trace the syntactic properties of sentence embedding vector representations. The dataset for probing was automatically generated using several templates related to different sentence structures. To classify the syntactic properties of sentences for each probing task, we measured the adaptation effects of the language models using syntactic priming. We performed linear mixed-effects model analyses to analyze the relation between adaptation effects in a complex statistical manner and reveal how the L2 language models represent syntactic features for English sentences. When the L2 language models were compared with the baseline L1 Gulordava language models, the analogous results were found for each probing task. In addition, it was confirmed that the L2 language models contain syntactic features of relative and coordinate clauses hierarchically in the sentence embedding representations.

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF

Secure Asymmetric Watermarking Based on Correlation Detection (상관도 검출기반의 안전한 비대칭 워터마킹)

  • Li De;Kim JongWeon;Choi JongUk
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.379-386
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, has method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Deterministic manipulation and visualization of near field with ultra-smooth, super-spherical gold nanoparticles by atomic force microscopy

  • KIM, MINWOO;LEE, JOOHYUN;YI, GI-RA;LEE, SEUNGWOO;SONG, YOUNG JAE
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.111.1-111.1
    • /
    • 2015
  • As an alternative way to get sophisticated nanostructures, atomic force microscopy (AFM) has been used to directly manipulate building primitives. In particular, assembly of metallic nanoparticles(NPs) can provide various structures for making various metamolecules. As far, conventionally made polygonal shaped metallic NPs showed non-uniform distribution in size and shape which limit its study of fundamental properties and practical applications. In here, we optimized conditions for deterministic manipulation of ultra-smooth and super-spherical gold nanoparticles (AuNPs) by AFM. [1] Lowered adhesion force by using platinum-iridium coated AFM tips enabled us to push super-spherical AuNPs in linear motion to pre-programmed position. As a result, uniform and reliable electric/magnetic behaviors of assembled metamolecules were achieved which showed a good agreement with simulation data. Furthermore, visualization of near field for super-spherical AuNPs was also addressed using photosensitive azo-dye polymers. Since the photosensitive azo-dye polymers can directly record the intensity of electric field, optical near field can be mapped without complicated instrumental setup. [2] By controlling embedding depth of AuNPs, we studied electric field of AuNPs in different configuration.

  • PDF

A Study on Chaotic Phenomenon in Rolling Mill Bearing (압연기 베어링에서의 카오스 현상에 관한 연구)

  • 배영철
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.315-319
    • /
    • 2001
  • A diagnosis system that provides early warnings regarding machine malfunction is very important for rolling mill so as to avoid great losses resulting from unexpected shutdown of the production line. But it is very difficult to provide e8rly w, ul1ings in rolling mill. Because dynamics of rolling mill is non-linear. This paper shows a chaotic behaviour of vibration signal in rolling mill using embedding method. Phase plane and Poincare map, FFT and histogram of vibration signal in rolling mill are implemented by qualitative analysis and Fractal dimension, Lyapunov exponent are presented by quantitative analysis.

  • PDF

Comparative Study of Dimension Reduction Methods for Highly Imbalanced Overlapping Churn Data

  • Lee, Sujee;Koo, Bonhyo;Jung, Kyu-Hwan
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.4
    • /
    • pp.454-462
    • /
    • 2014
  • Retention of possible churning customer is one of the most important issues in customer relationship management, so companies try to predict churn customers using their large-scale high-dimensional data. This study focuses on dealing with large data sets by reducing the dimensionality. By using six different dimension reduction methods-Principal Component Analysis (PCA), factor analysis (FA), locally linear embedding (LLE), local tangent space alignment (LTSA), locally preserving projections (LPP), and deep auto-encoder-our experiments apply each dimension reduction method to the training data, build a classification model using the mapped data and then measure the performance using hit rate to compare the dimension reduction methods. In the result, PCA shows good performance despite its simplicity, and the deep auto-encoder gives the best overall performance. These results can be explained by the characteristics of the churn prediction data that is highly correlated and overlapped over the classes. We also proposed a simple out-of-sample extension method for the nonlinear dimension reduction methods, LLE and LTSA, utilizing the characteristic of the data.

Design of Cellular Power Amplifier Using a SifSiGe HBT

  • Hyoung, Chang-Hee;Klm, Nam-Young;Han, Tae-Hyeon;Lee, Soo-Min;Cho, Deok-Ho
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1997.04a
    • /
    • pp.236-238
    • /
    • 1997
  • A cellular power amplifier using an APCVD(Atmospheric Pressure Chemical Vapor Deposition)-grown SiGe base HBT of ETRI has been designed with a linear simulation CAD. The Si/SiGe HBT with an emitter area of 2$\times$8${\mu}{\textrm}{m}$$^2$typically has a cutoff frequency(f$_{T}$) of 7.0 GHz and a maximum oscillation frequency(f$_{max}$) of 16.1 GHz with a pad de-embedding A packaged power Si/SiGe HBT with an emitter area of 2$\times$8$\times$80${\mu}{\textrm}{m}$$^2$typically shows a f$_{T}$ of 4.7 GHz and a f$_{max}$ of 7.1 GHz at a collector current (Ic) of 115 mA. The power amplifier exhibits a Forward transmission coefficient(S21) of 13.5 dB, an input and an output reflection coefficients of -42 dB and -45 dB respectively. Up to now the III-V compound semiconductor devices hale dominated microwave applications, however a rapid progress in Si-based technology make the advent of the Si/SiGe HBT which is promising in low to even higher microwave range because of lower cost and relatively higher reproducibility of a Si-based process.ess.ess.

  • PDF

Co-registration of Multiple Postmortem Brain Slices to Corresponding MRIs Using Voxel Similarity Measures and Slice-to-Volume Transformation

  • Kim Tae-Seong
    • Journal of Biomedical Engineering Research
    • /
    • v.26 no.4
    • /
    • pp.231-241
    • /
    • 2005
  • New methods to register multiple hemispheric slices of the postmortem brain to anatomically corresponding in-vivo MRI slices within a 3D volumetric MRI are presented. Gel-embedding and fiducial markers are used to reduce geometrical distortions in the postmortem brain volume. The registration algorithm relies on a recursive extraction of warped MRI slices from the reference MRI volume using a modified non-linear polynomial transformation until matching slices are found. Eight different voxel similarity measures are tested to get the best co-registration cost and the results show that combination of two different similarity measures shows the best performance. After validating the implementation and approach through simulation studies, the presented methods are applied to real data. The results demonstrate the feasibility and practicability of the presented co­registration methods, thus providing a means of MR signal analysis and histological examination of tissue lesions via co­registered images of postmortem brain slices and their corresponding MRI sections. With this approach, it is possible to investigate the pathology of a disease through both routinely acquired MRls and postmortem brain slices, thus improving the understanding of the pathological substrates and their progression.

Transmission of Channel Error Information over Voice Packet (음성 패킷을 이용한 채널의 에러 정보 전달)

  • 박호종;차성호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.4
    • /
    • pp.394-400
    • /
    • 2002
  • In digital speech communications, the quality of service can be increased by speech coding scheme that is adaptive to the error rate of voice packet transmission. However, current communication protocol in cellular and internet communications does not provide the function that transmits the channel error information. To solute this problem, in this paper, new method for real-time transmission of channel error information is proposed, where channel error information is embedded in voice packet. The proposed method utilizes the pulse positions of codevector in ACELP speech codec, which results in little degradation in speech quality and low false alarm rate. The simulations with various speech data show that the proposed method meets the requirement in speech quality, detection rate, and false alarm rate.