• Title/Summary/Keyword: sign algorithm

Search Result 278, Processing Time 0.024 seconds

A Lip-reading Algorithm Using Optical Flow and Properties of Articulatory Phonation (광류와 조음 발성 특성을 이용한 립리딩 알고리즘)

  • Lee, Mi Ae
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.7
    • /
    • pp.745-754
    • /
    • 2018
  • Language is an essential tool for verbal and emotional communication among human beings, enabling them to engage in social interactions. Although a majority of hearing-impaired people can speak; however, they are unable to receive feedback on their pronunciation most of them can speak. However, they do not receive feedback on their pronunciation. This results in impaired communication owing to incorrect pronunciation, which causes difficulties in their social interactions. If hearing-impaired people could receive continuous feedback on their pronunciation and phonation through lip-reading training, they could communicate more effectively with people without hearing disabilities, anytime and anywhere, without the use of sign language. In this study, the mouth area is detected from videos of learners speaking monosyllabic words. The grayscale information of the detected mouth area is used to estimate a velocity vector using Optical Flow. This information is then quantified as feature values to classify vowels. Subsequently, a system is proposed that classifies monosyllables by algebraic computation of geometric feature values of lips using the characteristics of articulatory phonation. Additionally, the system provides feedback by evaluating the comparison between the information which is obtained from the sample categories and experimental results.

The Principle of Dual Semiotic Process in Animation - Within Structuralism Semiotics - (애니메이션의 이중적 기호작용 원리 - 구조주의 기호학의 관점에서 -)

  • Joo Young-Sook;Kim Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.9
    • /
    • pp.1196-1207
    • /
    • 2006
  • In this paper, study on organization factors and algorithm of semiotics in Animation text within Roland Gerard Barthes's Structurism semiotics theory. It is possible through this approach that we can analyse the effective mechanism which delivers messages(or text) of animation, instead of plain analysis of classical semiotics. and then It will be able to keep watch on the blind viewpoint of the pure aesthetics which does not consider a social duty. In the expression of single sentence by the view of Barthes's semiotics theory, the text of animation is 'one sign has duplex role'. when it is explained another, the animation of mass media is special processing that makes conception and significance. in other words, the order of domination likely natural rule assimilate mass people to itself by the animation of mass media

  • PDF

Bayesian Variable Selection in Linear Regression Models with Inequality Constraints on the Coefficients (제한조건이 있는 선형회귀 모형에서의 베이지안 변수선택)

  • 오만숙
    • The Korean Journal of Applied Statistics
    • /
    • v.15 no.1
    • /
    • pp.73-84
    • /
    • 2002
  • Linear regression models with inequality constraints on the coefficients are frequently used in economic models due to sign or order constraints on the coefficients. In this paper, we propose a Bayesian approach to selecting significant explanatory variables in linear regression models with inequality constraints on the coefficients. Bayesian variable selection requires computation of posterior probability of each candidate model. We propose a method which computes all the necessary posterior model probabilities simultaneously. In specific, we obtain posterior samples form the most general model via Gibbs sampling algorithm (Gelfand and Smith, 1990) and compute the posterior probabilities by using the samples. A real example is given to illustrate the method.

An Efficient Dynamic Group Signature with Non-frameability

  • Xie, Run;Xu, Chunxiang;He, Chanlian;Zhang, Xiaojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2407-2426
    • /
    • 2016
  • A group signature scheme allows any member to sign on behalf of a group. It is applied to practical distributed security communication environments, such as privacy-preserving, data mining. In particular, the excellent features of group signatures, including membership joining and revocation, anonymity, traceability, non-frameability and controllable linkability, make group signature scheme more attractive. Among these features, non-frameability can guarantee that a member's signature cannot be forged by any other (including issuer), and controllable linkability supports to confirm whether or not two group signatures are created by the same signer while preserving anonymity. Until now, only Hwang et al.'s group schemes (proposed in 2013 and 2015) can support all of these features. In this paper, we present a new dynamic group signature scheme which can achieve all of the above excellent features. Compared with their schemes, our scheme has the following advantages. Firstly, our scheme achieves more efficient membership revocation, signing and verifying. The cost of update key in our scheme is two-thirds of them. Secondly, the tracing algorithm is simpler, since the signer can be determined without the judging step. Furthermore, in our scheme, the size of group public key and member's private key are shorter. Lastly, we also prove security features of our scheme, such as anonymity, traceability, non-frameability, under a random oracle model.

A Simple and Fast Pitch Search Algorithm Using a Modified Skipping Technique in CELP Vocoder (개선된 Skipping 기법을 이용한 CELP 보코더에서의 고속피치검색 알고리듬)

  • Lee, Joo-Hun;Bae, Myung-Jin;Kwon, Choon-Woo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.2E
    • /
    • pp.33-36
    • /
    • 1995
  • Based on the Characteristics of the correlation function of speech signal, the skipping technique can reduced the computation time considerably with a little degradation of speech quality. To improve the speech quality of the skipping technique, we use the reduced form of the correlation function to check the sign of the correlation value before the match score is calculated. The experimental results show that this modified skipping technique can reduce the computation time in pitch search over 35% compared with the traditional full search method without quality degradation.

  • PDF

Efficient Handoff Time Decision Algorithm using Differential RSSI (차등 RSSI를 이용한 효율적인 핸드오프 시점 결정 알고리즘)

  • Kwon Young-Hwan;Choi Seong-Gon;Choi Jun-Kyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.323-330
    • /
    • 2006
  • This paper proposes a handoff time decision mechanism to utilize resource efficiently by using Differential Received Signal Strength Indicator (DRSSI). DRSSI can be used to predict the movement direction of Mobile Station (MS). In other words, DRSSI changes its sign (+ or -) when a MS changes movement direction. This mechanism maximizes resource availability of Base Station (BS) by predicting resource reservation of MS and by giving priority of resource to MS. It is possible when a BS predicts the behavior of MSs by monitoring the DRSSI of MSs in overlapped region among cells. Additionally, we show that our proposed mechanism has better handoff blocking probability than existing mechanism with numerical modeling and analysis.

A Server-Independent Password Authentication Method for Access-Controlled Web Pages Using the SHA-1 Algorithm (SHA-1 방식을 이용한 제한된 웹 페이지에 접근하기 위한 서버 독립적인 패스워드 인정 방안)

  • 하창승;조익성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.146-153
    • /
    • 2001
  • A new password authentication method Is proposed in this paper for the purpose of providing web page authors the convenience in deploying password-protected Web realms at a web server. According to this method. a web realm is mapped to a secret directory at the web server. in which access-controlled web pages are stored. A password is used to construct the name of the secret directory. A javaScript code is embedded in a sign-in web pageoutside the secret directory, which converts the user-entered password into the directory name and forms a complete URL pointing to an access-controlled web page inside the secret directory. Thus, only users knowing the password can compose a valid URL and retrieve the access-controlled web page. Using this method, web page authors can deploy password-protected web realms in a server-independent manner.

  • PDF

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.6
    • /
    • pp.483-499
    • /
    • 2020
  • In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

Unsupervised Multispectral Image Segmentation Based on 1D Combined Neighborhood Differences (1D 통합된 근접차이에 기반한 자율적인 다중분광 영상 분할)

  • Saipullah, Khairul Muzzammil;Yun, Byung-Choon;Kim, Deok-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.625-628
    • /
    • 2010
  • This paper proposes a novel feature extraction method for unsupervised multispectral image segmentation based in one dimensional combined neighborhood differences (1D CND). In contrast with the original CND, which is applied with traditional image, 1D CND is computed on a single pixel with various bands. The proposed algorithm utilizes the sign of differences between bands of the pixel. The difference values are thresholded to form a binary codeword. A binomial factor is assigned to these codeword to form another unique value. These values are then grouped to construct the 1D CND feature image where is used in the unsupervised image segmentation. Various experiments using two LANDSAT multispectral images have been performed to evaluate the segmentation and classification accuracy of the proposed method. The result shows that 1D CND feature outperforms the spectral feature, with average classification accuracy of 87.55% whereas that of spectral feature is 55.81%.

Development of an Evidence-Based Protocol for Preventing Delirium in Intensive Care Unit Patients (중환자실 섬망예방을 위한 근거중심 간호중재 프로토콜 개발)

  • Moon, Kyoung Ja;Lee, Sun Mi
    • Journal of Korean Clinical Nursing Research
    • /
    • v.16 no.3
    • /
    • pp.175-186
    • /
    • 2010
  • Purpose: Delirium can be a highly prevalent symptom in intensive care units but it may still be under-recognized despite its relation with inclined morbidity, mortality, cost, and readmission. Therefore, this study aimed to develop a protocol that covers risk factors and non-pharmacological interventions to prevent delirium in ICU patients. Methods: This study was conducted using methodological design, and it followed the Scottish Intercollegiate Guideline Network (SIGN) guideline development steps: 1) the scope of protocol was decided (population, intervention, comparison, and outcomes); 2) guidelines, systematic reviews, and protocols were reviewed and checked using methodology checklist; 3) the level of evidence and recommendation grades was assigned; 4) the appropriateness of recommendations was scored by experts; 5) the final protocol & algorithm was modified and complemented. Results: The evidence-based delirium prevention protocol was completed that includes predisposing factors, precipitating factors and recommendations with evidenced grades. Conclusion: This protocol can be used as a guide nurses in screening patients with high risk factors of delirium as well as in intervening the patients non-pharmacologically to prevent delirium.