• Title/Summary/Keyword: original order

Search Result 2,464, Processing Time 0.033 seconds

Improving transformer-based speech recognition performance using data augmentation by local frame rate changes (로컬 프레임 속도 변경에 의한 데이터 증강을 이용한 트랜스포머 기반 음성 인식 성능 향상)

  • Lim, Seong Su;Kang, Byung Ok;Kwon, Oh-Wook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.122-129
    • /
    • 2022
  • In this paper, we propose a method to improve the performance of Transformer-based speech recognizers using data augmentation that locally adjusts the frame rate. First, the start time and length of the part to be augmented in the original voice data are randomly selected. Then, the frame rate of the selected part is changed to a new frame rate by using linear interpolation. Experimental results using the Wall Street Journal and LibriSpeech speech databases showed that the convergence time took longer than the baseline, but the recognition accuracy was improved in most cases. In order to further improve the performance, various parameters such as the length and the speed of the selected parts were optimized. The proposed method was shown to achieve relative performance improvement of 11.8 % and 14.9 % compared with the baseline in the Wall Street Journal and LibriSpeech speech databases, respectively.

Multi-classification Sensitive Image Detection Method Based on Lightweight Convolutional Neural Network

  • Yueheng Mao;Bin Song;Zhiyong Zhang;Wenhou Yang;Yu Lan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1433-1449
    • /
    • 2023
  • In recent years, the rapid development of social networks has led to a rapid increase in the amount of information available on the Internet, which contains a large amount of sensitive information related to pornography, politics, and terrorism. In the aspect of sensitive image detection, the existing machine learning algorithms are confronted with problems such as large model size, long training time, and slow detection speed when auditing and supervising. In order to detect sensitive images more accurately and quickly, this paper proposes a multiclassification sensitive image detection method based on lightweight Convolutional Neural Network. On the basis of the EfficientNet model, this method combines the Ghost Module idea of the GhostNet model and adds the SE channel attention mechanism in the Ghost Module for feature extraction training. The experimental results on the sensitive image data set constructed in this paper show that the accuracy of the proposed method in sensitive information detection is 94.46% higher than that of the similar methods. Then, the model is pruned through an ablation experiment, and the activation function is replaced by Hard-Swish, which reduces the parameters of the original model by 54.67%. Under the condition of ensuring accuracy, the detection time of a single image is reduced from 8.88ms to 6.37ms. The results of the experiment demonstrate that the method put forward has successfully enhanced the precision of identifying multi-class sensitive images, significantly decreased the number of parameters in the model, and achieved higher accuracy than comparable algorithms while using a more lightweight model design.

Cell Images Classification using Deep Convolutional Autoencoder of Unsupervised Learning (비지도학습의 딥 컨벌루셔널 자동 인코더를 이용한 셀 이미지 분류)

  • Vununu, Caleb;Park, Jin-Hyeok;Kwon, Oh-Jun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.942-943
    • /
    • 2021
  • The present work proposes a classification system for the HEp-2 cell images using an unsupervised deep feature learning method. Unlike most of the state-of-the-art methods in the literature that utilize deep learning in a strictly supervised way, we propose here the use of the deep convolutional autoencoder (DCAE) as the principal feature extractor for classifying the different types of the HEp-2 cell images. The network takes the original cell images as the inputs and learns to reconstruct them in order to capture the features related to the global shape of the cells. A final feature vector is constructed by using the latent representations extracted from the DCAE, giving a highly discriminative feature representation. The created features will be fed to a nonlinear classifier whose output will represent the final type of the cell image. We have tested the discriminability of the proposed features on one of the most popular HEp-2 cell classification datasets, the SNPHEp-2 dataset and the results show that the proposed features manage to capture the distinctive characteristics of the different cell types while performing at least as well as the actual deep learning based state-of-the-art methods.

A Taxonomy of Geriatric Hospitals Using National Health Insurance Claim Data (건강보험청구자료로 본 요양병원의 기능 유형)

  • Min Kyoung Lim;Sun-Jea Kim;Jeong-Yeon Seon
    • Korea Journal of Hospital Management
    • /
    • v.28 no.2
    • /
    • pp.9-20
    • /
    • 2023
  • Purpose: This study classified the actual functions of geriatric hospitals and examined the differences in their characteristics, in order to provide a basis for discussions on defining the functions of geriatric hospitals and how to pay for care. Methodology: This study used various administrative data such as health insurance data and long-term care insurance data. Cluster analysis was used to categorize geriatric hospitals. To examine the validity of the cluster analysis results, we conducted a discriminant analysis to calculate the accuracy of the classification. To examine cluster characteristics, we examined structure, process, and outcome indicators for each cluster. Findings: The cluster analysis identified five clusters. They were geriatric hospitals with relatively short stays for cancer patients(cluster 1; cancer patient-centered), geriatric hospitals with relatively large numbers of patients using rehabilitation services(cluster 2; rehabilitation patient-centered), geriatric hospitals with a high proportion of relatively severe elderly patients(cluster 3; severe elderly patient-centered), geriatric hospitals with a high proportion of mildly ill elderly patients with various conditions(cluster 4; mildly ill elderly patient-centered), and geriatric hospitals with a significantly higher proportion of dementia patients(cluster 5; dementia patient-centered). The largest number of geriatric hospitals were categorized in clusters 4 and 5, and the structure and process indicators for these clusters were generally lower than for the other clusters. Practical Implications: We have confirmed the existence of geriatric hospitals where the medical function, which is the original purpose of a geriatric hospital, has been weakened. It has been observed that the quality level of these geriatric hospitals is likely to be lower compared to hospitals that prioritize enhanced medical functions. Therefore, it is suggested to consider the conversion of these geriatric hospitals into long-term care facilities, and careful consideration should be given to the review of care-giver payment coverage.

  • PDF

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

A Study on Legal Protection of Digital Contents in Library (도서관에서의 디지털콘텐츠 법적 보호에 관한 연구)

  • Hong, Jae-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.83-114
    • /
    • 2006
  • The research investigated definition, scope and feature of digital contents in order to discuss legal protection of digital contents. The protection law and current trend of protection of digital contents in United States of America, EU and Japan were examined. As the law which protects digital contents in Korea. the contents and characteristics, etc. of copyright act of Korea and online digital contents industry development act were examined and analyzed. And then relationship of digital contents and copyright, namely, the relationship of database and copyright, relationship of digital contents by translation. arrangement, alteration, dramatization, cinematization, etc. of an original work and copyright; relationship of other digital contents and copyright; relationship of file sharing of digital contents and copyright, were examined and copyright issues were discussed in library. And also the research suggested concretely necessary countermeasure of copyright which the library must take. Finally, this paper suggested the improvement direction for legal protection of digital contents we must aim ultimately.

Application Analysis of Digital Photogrammetry and Optical Scanning Technique for Cultural Heritages Restoration (문화재 원형복원을 위한 수치사진측량과 광학스캐닝기법의 응용분석)

  • Han, Seung Hee;Bae, Yeon Soung;Bae, Sang Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.5D
    • /
    • pp.869-876
    • /
    • 2006
  • In the case of earthenware cultural heritages that are found in the form of fragments, the major task is quick and precise restoration. The existing method, which follows the rule of trial and error, is not only greatly time consuming but also lacked precision. If this job could be done by three dimensional scanning, matching up pieces could be done with remarkable efficiency. In this study, the original earthenware was modeled through three-dimensional pattern scanning and photogrammetry, and each of the fragments were scanned and modeled. In order to obtain images from the photogrammetry, we calibrated and used a Canon EOS 1DS real size camera. We analyzed the relationship among the sections of the formed model, efficiently compounded them, and analyzed the errors through residual and color error map. Also, we built a web-based three-dimensional simulation environment centering around the users, for the virtual museum.

Development of Learning Program using Chinese Whispers Game(Broken Telephone Game) for Systematic Assessment and Reporting of Patients and Exploration on Learners' Experiences (속삭임게임을 활용한 체계적 환자사정 및 보고 교육프로그램의 개발 및 학습자 경험탐색)

  • Jung, Hyun-Jung
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.143-153
    • /
    • 2019
  • In order to save lives by recognizing the deteriorating changes of the patients, patient's assessment and reporting should be foundation, but this task is mainly delegated to nursing students or inexperienced nurses. A whisper game is a game in which the first person whisper selects a word, phrase or sentence and delivers it to the team member and finally confirms how many original message have changed during the transmit process. The purpose of this study was to develop a whisper game program to transmit the information of the children included in the DVD using in the pediatric advanced life support process. After four times of games, the experiences of 31 nursing students in the fourth grade were explored by analyzing the reflective journal. The results of the study showed three themes: learning motivation, metacognitive ability, and situated contextual learning. Repeated practice through a whisper game is expected to be widely used because it has been identified as a fresh and interesting learning method that enables nursing students to metacognize the process of assessing patients and conveying information in the contextual situation.

A Study on Constructing a Digital Archive System of the Modern Korean Christian Collections (근대 한국기독교 자료의 디지털 아카이브 시스템 구축에 관한 연구)

  • Yang, Ji-Ann
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.681-691
    • /
    • 2022
  • The purpose of this study is to construct a digital archive system by analyzing the collections of the Korean Christian Museum at S University, which has a large number of materials related to Korean Christianity published in the modern period from the time of Korea's enlightenment until liberation. In order to construct a digital archive system, indexes and metadata for the collection are complied according to the pre-defined format. After digitizing the selected collection, a database is built using metadata information, and the actual system is divided into a web standard-based management system and a user service system. Also a content-based search system is constructed, which provides the matching value of retrieval results in units of one character and an automatic search term completion function to enhance user convenience. Therefore, collections in the museum, which are difficult to access the original text, are digitized and provided so that they can be easily used, laying the foundation for the long-term development of humanities contents for improving the accessibility and availability of collections for both researchers and the public.

Why do children loose their compliance with the law as they grow? (무법으로 태어나 준법을 거쳐 위법으로 성장하는 이유?)

  • Taekyun Hur
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.spc
    • /
    • pp.117-131
    • /
    • 2005
  • The present research integrated various theoretical perspectives of human unlawful behaviors in order to clarify the psychological mechanisms that underly the changes in compliance with and attitude toward law as time goes. Most well-known theories such as classical theory of crime, biosocial and evoluationary theories, and psychological perspectives including psycho-dynamic theory, personality, intellectual/moral development theories, and decision-making were discussed in their unique points in explaining human unlawful behaviors. Finally, social-learning theory and cognitive-dissonance theory has been suggested to explain the psychological mechanism of the phenomena in which people's attitude toward law and compliance with law become weaken through violation experiences of trivial lawful regulations. Especially, the logic of cognitive-dissonance theory (that people committed violation of trivial laws should experience dissonance with their original belief of compliance with law and negative arousal and try to remove the arousal by change their belief along with their behavior) were theoretically convincing to explain the phenomenon and supported by a series of experimental studies. Several practical implications for future constitutional and political activities were discussed in the basis of the cognitive dissonance theory.