• Title/Summary/Keyword: task features

Search Result 565, Processing Time 0.03 seconds

A study on speech disentanglement framework based on adversarial learning for speaker recognition (화자 인식을 위한 적대학습 기반 음성 분리 프레임워크에 대한 연구)

  • Kwon, Yoohwan;Chung, Soo-Whan;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.5
    • /
    • pp.447-453
    • /
    • 2020
  • In this paper, we propose a system to extract effective speaker representations from a speech signal using a deep learning method. Based on the fact that speech signal contains identity unrelated information such as text content, emotion, background noise, and so on, we perform a training such that the extracted features only represent speaker-related information but do not represent speaker-unrelated information. Specifically, we propose an auto-encoder based disentanglement method that outputs both speaker-related and speaker-unrelated embeddings using effective loss functions. To further improve the reconstruction performance in the decoding process, we also introduce a discriminator popularly used in Generative Adversarial Network (GAN) structure. Since improving the decoding capability is helpful for preserving speaker information and disentanglement, it results in the improvement of speaker verification performance. Experimental results demonstrate the effectiveness of our proposed method by improving Equal Error Rate (EER) on benchmark dataset, Voxceleb1.

Investigating the Combination of Bag of Words and Named Entities Approach in Tracking and Detection Tasks among Journalists

  • Mohd, Masnizah;Bashaddadh, Omar Mabrook A.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.4
    • /
    • pp.31-48
    • /
    • 2014
  • The proliferation of many interactive Topic Detection and Tracking (iTDT) systems has motivated researchers to design systems that can track and detect news better. iTDT focuses on user interaction, user evaluation, and user interfaces. Recently, increasing effort has been devoted to user interfaces to improve TDT systems by investigating not just the user interaction aspect but also user and task oriented evaluation. This study investigates the combination of the bag of words and named entities approaches implemented in the iTDT interface, called Interactive Event Tracking (iEvent), including what TDT tasks these approaches facilitate. iEvent is composed of three components, which are Cluster View (CV), Document View (DV), and Term View (TV). User experiments have been carried out amongst journalists to compare three settings of iEvent: Setup 1 and Setup 2 (baseline setups), and Setup 3 (experimental setup). Setup 1 used bag of words and Setup 2 used named entities, while Setup 3 used a combination of bag of words and named entities. Journalists were asked to perform TDT tasks: Tracking and Detection. Findings revealed that the combination of bag of words and named entities approaches generally facilitated the journalists to perform well in the TDT tasks. This study has confirmed that the combination approach in iTDT is useful and enhanced the effectiveness of users' performance in performing the TDT tasks. It gives suggestions on the features with their approaches which facilitated the journalists in performing the TDT tasks.

Development of an Experimental Humanoid Robot and Dynamics Based Motion Optimization for Rescue Missions (구조/구난 임무 수행을 위한 실험용 휴머노이드 로봇의 개발과 동역학 기반의 모션 최적화)

  • Hong, Seongil;Lee, Youngwoo;Park, Kyu Hyun;Lee, Won Suk;Sim, Okkee;Oh, Jun-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.8
    • /
    • pp.753-757
    • /
    • 2015
  • This paper introduces an experimental rescue robot, HUBO T-100 and presents the optimal motion control method. The objective of the rescue robot is to extract patients or wounded soldiers in the battlefield and hazardous environments. Another mission is to dispose and transport an explosive ordnance to safe places. To execute these missions, the upper body of the rescue robot is humanoid in form to execute various kinds of tasks. The lower body features a hybrid tracked/legged design, which allows for a variety of mode of locomotion, depending on terrain conditions in order to increase traversability. The weight lifting motion is one of the most important task for performing rescue related missions because the robot must lift an object or impaired person lying on the ground for transferring. Here, dynamics based motion optimization is employed to minimize joint torques while maintaining stability simultaneously. Physical experiments with a real humanoid robot, HUBO T-100, are presented to verify the proposed method.

Feature Extraction of Welds from Industrial Computed Radiography Using Image Analysis and Local Statistic Line-Clustering (산업용 CR 영상분석과 국부확률 선군집화에 의한 용접특징추출)

  • Hwang, Jung-Won;Hwang, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • A reliable extraction of welded area is the precedent task before the detection of weld defects in industrial radiography. This paper describes an attempt to detect and extract the welded features of steel tubes from the computed radiography(CR) images. The statistical properties are first analyzed on over 160 sample radiographic images which represent either weld or non-weld area to identify the differences between them. The analysis is then proceeded by pattern classification to determine the clustering parameters. These parameters are the width, the functional match, and continuity. The observed weld image is processed line by line to calculate these parameters for each flexible moving window in line image pixel set. The local statistic line-clustering method is used as the classifier to recognize each window data as weld or non-weld cluster. The sequential procedure is to track the edge lines between two distinct regions by iterative calculation of threshold, and it results in extracting the weld feature. Our methodology is concluded to be effective after experiment with CR weld images.

WAP Abstract Kernel Layer Supporting Multi-platform (다중 플랫폼 지원을 위한 WAP 추상 커널 계층)

  • Gang, Yeong-Man;Han, Sun-Hui;Jo, Guk-Hyeon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.265-272
    • /
    • 2001
  • In case of implementing a complicated application like WAP (Wireless Application Protocol) in a mobile terminal with the characteristics of bare machine and versatile kernel aspects of which are control, interrupt and IPC(Inter Process Communication), a special methodology should be needed. If not, it will cause more cost and human resources, even delayed product into launching for the time-to-market. This paper suggests AKL, (Abstract Kernel Layer) for the design and implementation of WAP on basis of multi-platform. AKL is running on the various kernel including REX, MS-DOS, MS-Window, UNIX and LINUX. For the purpose of it, AKL makes machine-dependant features be minimized and supports a consistent interface on API (Application Program Interface) point of view. Therefore, it makes poring times of a device be shorten and makes easy of maintenance. We validated our suggestion as a consequent of porting WAP into PlamV PDA and mobile phone with AKL.

  • PDF

A study on the new hybrid recurrent TDNN-HMM architecture for speech recognition (음성인식을 위한 새로운 혼성 recurrent TDNN-HMM 구조에 관한 연구)

  • Jang, Chun-Seo
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.699-704
    • /
    • 2001
  • ABSTRACT In this paper, a new hybrid modular recurrent TDNN (time-delay neural network)-HMM (hidden Markov model) architecture for speech recognition has been studied. In TDNN, the recognition rate could be increased if the signal window is extended. To obtain this effect in the neural network, a high-level memory generated through a feedback within the first hidden layer of the neural network unit has been used. To increase the ability to deal with the temporal structure of phonemic features, the input layer of the network has been divided into multiple states in time sequence and has feature detector for each states. To expand the network from small recognition task to the full speech recognition system, modular construction method has been also used. Furthermore, the neural network and HMM are integrated by feeding output vectors from the neural network to HMM, and a new parameter smoothing method which can be applied to this hybrid system has been suggested.

  • PDF

Development of the Financial Account Pre-screening System for Corporate Credit Evaluation (분식 적발을 위한 재무이상치 분석시스템 개발)

  • Roh, Tae-Hyup
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.41-57
    • /
    • 2009
  • Although financial information is a great influence upon determining of the group which use them, detection of management fraud and earning manipulation is a difficult task using normal audit procedures and corporate credit evaluation processes, due to the shortage of knowledge concerning the characteristics of management fraud, and the limitation of time and cost. These limitations suggest the need of systemic process for !he effective risk of earning manipulation for credit evaluators, external auditors, financial analysts, and regulators. Moot researches on management fraud have examined how various characteristics of the company's management features affect the occurrence of corporate fraud. This study examines financial characteristics of companies engaged in fraudulent financial reporting and suggests a model and system for detecting GAAP violations to improve reliability of accounting information and transparency of their management. Since the detection of management fraud has limited proven theory, this study used the detecting method of outlier(upper, and lower bound) financial ratio, as a real-field application. The strength of outlier detecting method is its use of easiness and understandability. In the suggested model, 14 variables of the 7 useful variable categories among the 76 financial ratio variables are examined through the distribution analysis as possible indicators of fraudulent financial statements accounts. The developed model from these variables show a 80.82% of hit ratio for the holdout sample. This model was developed as a financial outlier detecting system for a financial institution. External auditors, financial analysts, regulators, and other users of financial statements might use this model to pre-screen potential earnings manipulators in the credit evaluation system. Especially, this model will be helpful for the loan evaluators of financial institutes to decide more objective and effective credit ratings and to improve the quality of financial statements.

The Current VIP Guard System and Its Development (요인의 안전을 위한 경호조직 분석 및 발전 방안)

  • 오세용;김창은
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.81-98
    • /
    • 2003
  • In modern society, there are diverse sorts of VIPs including a king and individuals. Some like a king or president are in need of professional secret services, and others become VIPs by being guarded by a bodyguard company at their own request. The former is called a public guard, and the latter is a private one. In the field of the public guard, the nation should be furnished with a guard system in consideration of political circumstances to protect VIPs. That is, the parliamentary cabinet system and presidential system call for a different guard system, and the guard system's professional features vary to some degree with political situations and cultural climate. If the ultimate goal of guard is to protect the chief of the democratic and open state in a most efficient and safe manner, it's mandatorily necessary to set up a professional and specialized guard organization to provide democratic and efficient secret services. It's desired that the domestic presidential guard division should be staffed with not only expert guards but other personnels dispatched from the military and police. In the police, guard mission is splitted among various guard and security agencies, including the National Police Agency's public security bureau or the Seoul Metropolitan Police Agency's public security division, 101 security unit, mobile police and 22 special guard division. As a chain of command is separated and it's difficult to manage such organizations effectively, the National Police Agency should be exclusively in charge of VIP guard and security. In the area of private guard, the private police system has shared national security task as a middle organization between the private police and private guard. But now its intent has gradually weakened, and its mission should be redefined. In addition, the way people look at private guard should change, and they should be well informed that it could serve to prevent possible crimes, protect them against crimes and get rid of their inconveniences. To make a good impression on people, the guard associations and businesses should put their efforts into reinforcing publicity activities, and the government, academic circles and press should team up with them as well.

A ProstateSegmentationofTRUS ImageusingSupport VectorsandSnake-likeContour (서포트 벡터와 뱀형상 윤곽선을 이용한 TRUS 영상의 전립선 분할)

  • Park, Jae Heung;Se, Yeong Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.101-109
    • /
    • 2012
  • In many diagnostic and treatment procedures for prostate disease accurate detection of prostate boundaries in transrectal ultrasound(TRUS) images is required. This is a challenging and difficult task due to weak prostate boundaries, speckle noise and the short range of gray levels. In this paper a method for automatic prostate segmentation inTRUS images using support vectors and snake-like contour is presented. This method involves preprocessing, extracting Gabor feature, training, and prostate segmentation. Gabor filter bank for extracting the texture features has been implemented. A support vector machine(SVM) for training step has been used to get each feature of prostate and nonprostate. The boundary of prostate is extracted by the snake-like contour algorithm. The results showed that this new algorithm extracted the prostate boundary with less than 9.3% relative to boundary provided manually by experts.

Revision of the Railway Human Reliability Analysis Procedure and Development of an R-HRA Software (철도사고 위험도평가를 위한 철도 인간신뢰도분석 방법의 개정과 전산 소프트웨어의 개발)

  • Kim, Jae-Whan;Kim, Seung-Hwan;Jang, Seung-Cheol
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.404-409
    • /
    • 2008
  • This paper consists largely of two parts: the first part introduces the revised railway human reliability analysis (R-HRA) method which is to be used under the railway risk assessment framework, and the second part presents the features of a computer software which was developed for aiding the R-HRA process. The revised R-HRA method supplements the original R-HRA method by providing a specific task analysis guideline and a classification of performance shaping factors (PSFs) to support a consistent analysis between analysts. The R-HRA software aids the analysts in gathering information for HRA, qualitative error prediction including identification of external error modes and internal error modes, quantification of human error probability, and reporting the overall analysis results. The revised R-HRA method and software are expected to support the analysts in an effective and efficient way in analysing human error potential in railway event or accident scenarios.