• Title/Summary/Keyword: phone set

Search Result 208, Processing Time 0.031 seconds

Pronunciation Variation Patterns of Loanwords Produced by Korean and Grapheme-to-Phoneme Conversion Using Syllable-based Segmentation and Phonological Knowledge (한국인 화자의 외래어 발음 변이 양상과 음절 기반 외래어 자소-음소 변환)

  • Ryu, Hyuksu;Na, Minsu;Chung, Minhwa
    • Phonetics and Speech Sciences
    • /
    • v.7 no.3
    • /
    • pp.139-149
    • /
    • 2015
  • This paper aims to analyze pronunciation variations of loanwords produced by Korean and improve the performance of pronunciation modeling of loanwords in Korean by using syllable-based segmentation and phonological knowledge. The loanword text corpus used for our experiment consists of 14.5k words extracted from the frequently used words in set-top box, music, and point-of-interest (POI) domains. At first, pronunciations of loanwords in Korean are obtained by manual transcriptions, which are used as target pronunciations. The target pronunciations are compared with the standard pronunciation using confusion matrices for analysis of pronunciation variation patterns of loanwords. Based on the confusion matrices, three salient pronunciation variations of loanwords are identified such as tensification of fricative [s] and derounding of rounded vowel [ɥi] and [$w{\varepsilon}$]. In addition, a syllable-based segmentation method considering phonological knowledge is proposed for loanword pronunciation modeling. Performance of the baseline and the proposed method is measured using phone error rate (PER)/word error rate (WER) and F-score at various context spans. Experimental results show that the proposed method outperforms the baseline. We also observe that performance degrades when training and test sets come from different domains, which implies that loanword pronunciations are influenced by data domains. It is noteworthy that pronunciation modeling for loanwords is enhanced by reflecting phonological knowledge. The loanword pronunciation modeling in Korean proposed in this paper can be used for automatic speech recognition of application interface such as navigation systems and set-top boxes and for computer-assisted pronunciation training for Korean learners of English.

Development of Rule-Based Malicious URL Detection Library Considering User Experiences (사용자 경험을 고려한 규칙기반 악성 URL 탐지 라이브러리 개발)

  • Kim, Bo-Min;Han, Ye-Won;Kim, Ga-Young;Kim, Ye-Bun;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.481-491
    • /
    • 2020
  • The malicious URLs which can be used for sending malicious codes and illegally acquiring private information is one of the biggest threat of information security field. Particularly, recent prevalence of smart-phone increases the possibility of the user's exposing to malicious URLs. Since the way of hiding the URL from the user is getting more sophisticated, it is getting harder to detect it. In this paper, after conducting a survey of the user experiences related to malicious URLs, we are proposing the rule-based malicious URL detection method. In addition, we have developed java library which can be applied to any other applications which need to handle the malicious URL. Each class of the library is implementation of a rule for detecting a characteristics of a malicious URL and the library itself is the set of rule which can have the chain of rule for deteciing more complicated situation and enhancing the accuracy. This kinds of rule based approach can enhance the extensibility considering the diversity of malicious URLs.

The Design and Implementation of EL/LX level3 C Standard Library for RTOS Qplus-P (EL/IX 단계 3을 적용한 실시간 운영체제 Qplus-P용 C 표준 라이브러리의 설계 및 구현)

  • Kim, Do-Hyung;Shin, Chang-Min;Park, Sung-Min
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.485-490
    • /
    • 2002
  • As the products of internet appliance, such as digital TV, internet set-top box, and internet phone, are continually produced, the market of real time operating system which controls those products is being highly increased. ETRI developed the extensible real time operating system, Qplus-P, which can be used from PDA to internet set-top box and home server. This paper describes the design and implementation of C standard library for real-time operating system Qplus-P. The Qplus-P C standard library follows EL/IX API level, which is proposed to the real-time operating system international standard by the RedHat. And, the C standard library functions, which are needed to support the Tiny-X and Kaffe, are also implemented. The implemented C standard library can reduce the size of library about 30% compare to the C library that does not follow EL/IX API level.

Initial Blank Optimization Design of Square Can Multistage Drawing considering Formability and Product Shape (사각형 캔 드로잉 다단 공정에서 성형성과 제품형상을 동시에 고려한 초기 블랭크 형상 최적 설계)

  • Park, Sang-Min;Kim, Dong Kyu;Hong, Seokmoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.320-326
    • /
    • 2017
  • Multistage deep-drawing technology is used widely in the production of mobile phone battery cases to improve productivity and economy. To ensure adequate capacity and rigidity, such cases are fabricated as a rectangular cup with a high slender ratio. The multistage deep-drawing of a rectangular cup entails a high slender ratio, and the heights of the product sides may be non-uniform because of the complicated deformation mechanisms. This causes problems in product assembly that affects the surface quality of the case. This study examined a blank shape that minimizes the height variations of the product to resolve the aforementioned problems. Optimization design and analysis were performed to identify the shape that yields the least variation. The long and short sides of an oval blank were set as the design variables. The objective function was set to yield the lowest height difference, and the thickness reduction rate of the product was set to the target range. In addition, the height of the final shape was set as a constraint. The height difference was minimized successfully using the optimized design. The design process of the initial blank for all rectangular shapes can be automated in the future.

Design of a bluetooth-based interactive control network

  • Kwak, Jae-Hyuk;Lim, Joon-Hong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.922-925
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connection of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments. The bluetooth system supports both point-to-point connection and point-to-multipoint connections. In point-to-multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There is one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The Bluetooth standard has been suggested that Bluetooth equipments can be used in the short-range, maximum 100 meters . It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

  • PDF

Detecting and Segmenting Text from Images for a Mobile Translator System

  • Chalidabhongse, Thanarat H.;Jeeraboon, Poonsak
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.875-878
    • /
    • 2004
  • Researching in text detection and segmentation has been done for a long period in the OCR area. However, there is some other area that the text detection and segmentation from images can be very useful. In this report, we first propose the design of a mobile translator system which helps non-native speakers to understand the foreign language using ubiquitous mobile network and camera mobile phones. The main focus of the paper will be the algorithm in detecting and segmenting texts embedded in the natural scenes from taken images. The image, which is captured by a camera mobile phone, is transmitted to a translator server. It is initially passed through some preprocessing processes to smooth the image as well as suppress noises. A threshold is applied to binarize the image. Afterward, an edge detection algorithm and connected component analysis are performed on the filtered image to find edges and segment the components in the image. Finally, the pre-defined layout relation constraints are utilized in order to decide which components likely to be texts in the image. A preliminary experiment was done and the system yielded a recognition rate of 94.44% on a set of 36 various natural scene images that contain texts.

  • PDF

Comparison of Teaching about Breast Cancer via Mobile or Traditional Learning Methods in Gynecology Residents

  • Alipour, Sadaf;Moini, Ashraf;Jafari-Adli, Shahrzad;Gharaie, Nooshin;Mansouri, Khorshid
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4593-4595
    • /
    • 2012
  • Introduction: Mobile learning enables users to interact with educational resources while in variable locations. Medical students in residency positions need to assimilate considerable knowledge besides their practical training and we therefore aimed to evaluate the impact of using short message service via cell phone as a learning tool in residents of Obstetrics and Gynecology in our hospital. Methods: We sent short messages including data about breast cancer to the cell phones of 25 residents of gynecology and obstetrics and asked them to study a well-designed booklet containing another set of information about the disease in the same period. The rate of learning derived from the two methods was compared by pre- and post-tests and self-satisfaction assessed by a relevant questionnaire at the end of the program. Results: The mobile learning method had a significantly better effect on learning and created more interest in the subject. Conclusion: Learning via receiving SMS can be an effective and appealing method of knowledge acquisition in higher levels of education.

A Study of Trajectory Mapping Method as a User Interface Design Tool for Mobile Devices (모바일 기기의 사용자 인터페이스 설계 도구로서 Trajectory Mapping 방법에 관한 연구)

  • Lee, Suk-Won;Myung, Ro-Hae
    • IE interfaces
    • /
    • v.22 no.1
    • /
    • pp.17-25
    • /
    • 2009
  • In mobile device's user interface, menu organization is very important as well as menu structure because small display of mobile device. Menu items should be organized based on user knowledge structure to design user-centered interface. Traditionally, MDS (Multidimensional Scaling) have been most often used to expose users' perceived organization of menu items. But, information that MDS reveals is just relative spatial location of concepts and not relevant to concepts connection. Unlike MDS, Trajectory Mapping explicitly finds users' cognitive links between perceived concepts. This study proposes a Trajectory Mapping technique for eliciting knowledge structure, especially a set of cognitive pathways linking menu items, from end user. With twelve participants, MDS and Trajectory Mapping were conducted using cellular phone's menu items. And user knowledge structure was analyzed through Visual Concept Map that combination of results of MDS and Trajectory Mapping. After then, menu items were organized according to users' perceived organization. Empirical usability test was also conducted. The results of usability test showed that usability, in terms of task performance time, number of errors, and satisfaction, for newly organized interface was significantly improved compare to original interface. The methodology of this study is expected to be applicable to design a user-centered interface. In other words, Trajectory Mapping technique can be used as a design tool of user interface for imposing user knowledge structure on the interface.

A Method for Analyzing Web Log of the Hadoop System for Analyzing a Effective Pattern of Web Users (효과적인 웹 사용자의 패턴 분석을 위한 하둡 시스템의 웹 로그 분석 방안)

  • Lee, Byungju;Kwon, Jungsook;Go, Gicheol;Choi, Yonglak
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.231-243
    • /
    • 2014
  • Of the various data that corporations can approach, web log data are important data that correspond to data analysis to implement customer relations management strategies. As the volume of approachable data has increased exponentially due to the Internet and popularization of smart phone, web log data have also increased a lot. As a result, it has become difficult to expand storage to process large amounts of web logs data flexibly and extremely hard to implement a system capable of categorizing, analyzing, and processing web log data accumulated over a long period of time. This study thus set out to apply Hadoop, a distributed processing system that had recently come into the spotlight for its capacity of processing large volumes of data, and propose an efficient analysis plan for large amounts of web log. The study checked the forms of web log by the effective web log collection methods and the web log levels by using Hadoop and proposed analysis techniques and Hadoop organization designs accordingly. The present study resolved the difficulty with processing large amounts of web log data and proposed the activity patterns of users through web log analysis, thus demonstrating its advantages as a new means of marketing.

A Study on the Emoticon Extraction based on Facial Expression Recognition using Deep Learning Technique (딥 러닝 기술 이용한 얼굴 표정 인식에 따른 이모티콘 추출 연구)

  • Jeong, Bong-Jae;Zhang, Fan
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.43-53
    • /
    • 2017
  • In this paper, the pattern of extracting the same expression is proposed by using the Android intelligent device to identify the facial expression. The understanding and expression of expression are very important to human computer interaction, and the technology to identify human expressions is very popular. Instead of searching for the emoticons that users often use, you can identify facial expressions with acamera, which is a useful technique that can be used now. This thesis puts forward the technology of the third data is available on the website of the set, use the content to improve the infrastructure of the facial expression recognition accuracy, in order to improve the synthesis of neural network algorithm, making the facial expression recognition model, the user's facial expressions and similar e xpressions, reached 66%.It doesn't need to search for emoticons. If you use the camera to recognize the expression, itwill appear emoticons immediately. So this service is the emoticons used when people send messages to others, and it can feel a lot of convenience. In countless emoticons, there is no need to find emoticons, which is an increasing trend in deep learning. So we need to use more suitable algorithm for expression recognition, and then improve accuracy.