• Title/Summary/Keyword: text input

Search Result 358, Processing Time 0.121 seconds

Automatic Acquisition of Domain Concepts for Ontology Learning using Affinity Propagation (온톨로지 학습을 위한 Affinity Propagation 기반의 도메인 컨셉 자동 획득 기법에 관한 연구)

  • Qasim, Iqbal;Jeong, Jin-Woo;Lee, Dong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.168-171
    • /
    • 2011
  • One important issue in semantic web is identification and selection of domain concepts for domain ontology learning when several hundreds or even thousands of terms are extracted and available from relevant text documents shared among the members of a domain. We present a novel domain concept acquisition and selection approach for ontology learning that uses affinity propagation algorithm, which takes as input semantic and structural similarity between pairs of extracted terms called data points. Real-valued messages are passed between data points (terms) until high quality set of exemplars (concepts) and cluster iteratively emerges. All exemplars will be considered as domain concepts for learning domain ontologies. Our empirical results show that our approach achieves high precision and recall in selection of domain concepts using less number of iterations.

Implementation of Optimal User Interface based on the Voice Output Embedded System for People with Profound Communication Disorder (중증언어장애자를 위한 음성 출력 임베디드 시스템을 기반으로 한 최적의 사용자 인터페이스 구현)

  • Yoo, Byung-Hyuk;Lee, Sang-Hun;Seo, Hee-Don
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.885-886
    • /
    • 2006
  • The purpose of this study is to develop the optimal system(AAC device), which helps a person with a profound communication disorder to communicate with other people. Therefore, this system includes the user interface enhancement that is the user adaptation mode algorithm. The symbol is made with a text and an icon which is converted into Korean. The message contiol operates scanning and adjusts rate control of row-column scanning and linear scanning. This embedded system includes voice input/output and voice recording as well suggested method that could apply optimal device access algorithm from clinical environment. Therefore, we are experting that even the current system itself will be able to improve the life quality of people who need to communicate with the help of devices.

  • PDF

SEMANTIC FEATURE DETECTION FOR REAL-TIME IMAGE TRANSMISSION OF SIGN LANGUAGE AND FINGER SPELLING

  • Hou, Jin;Aoki, Yoshinao
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1662-1665
    • /
    • 2002
  • This paper proposes a novel semantic feature detection (SFD) method for real-time image transmission of sign language and finger spelling. We extract semantic information as an interlingua from input text by natural language processing, and then transmit the semantic feature detection, which actually is a parameterized action representation, to the 3-D articulated humanoid models prepared in each client in remote locations. Once the SFD is received, the virtual human will be animated by the synthesized SFD. The experimental results based on Japanese sign langauge and Chinese sign langauge demonstrate that this algorithm is effective in real-time image delivery of sign language and finger spelling.

  • PDF

A Stream Ciphering Method using a Chaotic System

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.433-436
    • /
    • 2010
  • In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed back to encrypt the current data. The encryption block size and the amount of feedback data are different at each ciphering operation. Experimental results with the image/video date showed that this method has enough speed and encryption effect with negligible latency time. Thus, we are expecting it to have various application areas that need high speed stream ciphering with high security level.

Head Pointing System based Text Input Method for Person with physical disabilities (지체장애인을 위한 헤드 포인팅 시스템 기반 문자입력 방법)

  • Han, Sang-Heon;Yun, Tae-Soo;Lee, Dong-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.281-284
    • /
    • 2006
  • 본 논문은 지체장애인들의 컴퓨터 접근성을 향상시키기 위해서 Head Pointing System을 기반으로한 키보드 대체 방법을 제안한다. 먼저 컴퓨터의 접근성을 돕기위해 현재 사용되고있는 Head Pointing System에는 어떤 기능을 대체하고 있는지 간략하게 살펴보고, 본 논문에서 제안하는 방법이 이전에 사용되었던 Head Pointing System, On-Screen Keyboard를 함께 사용하여 문자를 입력하는 방식에 비해 어떤 이점이 있는 확인한다. 또한, Quikwriting 방식을 사용하여 사용자에게 단순하고 직관적인 제스쳐를 요구하도록하여 입력에 대한 부담을 낮추고, 사용자 개인의 제스쳐 특성에 따라 문자를 입력할 수 있도록 하기위해 신경망 알고리즘을 사용하였고 이를통해 Head Pointing System기반 문자입력 방법이 유용함을 확인할 수 있었다.

  • PDF

A computational algorithm for F0 contour generation in Korean developed with prosodically labeled databases using K-ToBI system (K-ToBI 기호에 준한 F0 곡선 생성 알고리듬)

  • Lee YongJu;Lee Sook-hyang;Kim Jong-Jin;Go Hyeon-Ju;Kim Yeong-Il;Kim Sang-Hun;Lee Jeong-Cheol
    • MALSORI
    • /
    • no.35_36
    • /
    • pp.131-143
    • /
    • 1998
  • This study describes an algorithm for the F0 contour generation system for Korean sentences and its evaluation results. 400 K-ToBI labeled utterances were used which were read by one male and one female announcers. F0 contour generation system uses two classification trees for prediction of K-ToBI labels for input text and 11 regression trees for prediction of F0 values for the labels. Evaluation results of the system showed 77.2% prediction accuracy for prediction of IP boundaries and 72.0% prediction accuracy for AP boundaries. Information of voicing and duration of the segments was not changed for F0 contour generation and its evaluation. Evaluation results showed 23.5Hz RMS error and 0.55 correlation coefficient in F0 generation experiment using labelling information from the original speech data.

  • PDF

ConWis: Assistive Software for People with Hearing and Speaking Disorders

  • Kodirov, Khasanboy;Kodirov, Khusanboy;Lee, Young-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.678-679
    • /
    • 2019
  • In this paper, we developed a medical computer application for both disable children and adults in order to provide the chance to communicate easily with others. Although there are many mobile healthcare apps available nowadays, we believe that users should also have many options for choosing different types of healthcare programs developed for computers. That's why we have developed ConWis. This application helps a person with hearing loss, voice, speech, or language disorder to communicate easily with others. Through this software, hearing and understanding what is being said more clearly or to express thoughts become easier. To use this software, patient should input a sentence and it will be converted to audio speech using built-in voices for man or woman. In addition to that, it can convert voice that is received by microphone into text and display it on the screen.

Structure Recognition Method in Various Table Types for Document Processing Automation (문서 처리 자동화를 위한 다양한 표 유형에서 표 구조 인식 방법)

  • Lee, Dong-Seok;Kwon, Soon-Kak
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.5
    • /
    • pp.695-702
    • /
    • 2022
  • In this paper, we propose the method of a table structure recognition in various table types for document processing automation. A table with items surrounded by ruled lines are analyzed by detecting horizontal and vertical lines for recognizing the table structure. In case of a table with items separated by spaces, the table structure are recognized by analyzing the arrangement of row items. After recognizing the table structure, the areas of the table items are input into OCR engine and the character recognition result output to a text file in a structured format such as CSV or JSON. In simulation results, the average accuracy of table item recognition is about 94%.

CMDNet: Single Shot Architecture for Clickable Mobile Screen Object Detection (CMDNet: 클릭 가능한 모바일 화면 객체 탐지를 위한 싱글 샷 아키텍처)

  • Jo, Min-Seok;Han, Seong-Soo;Jeong, Chang-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.418-421
    • /
    • 2021
  • 모바일 디바이스 화면에 대하여 클릭 가능한 객체를 인식하기 위한 Object detection network architecture 를 제안한다. DSSD 를 Baseline 으로 SE block 이 추가된 Backbone network 와 SSD layer, FPN 구조를 사용한다. 기존의 1:1 비율의 네트워크의 Input resolution 을 모바일 화면과 유사한 1:2 비율로 변경하여 효율적으로 피처를 추출한다. 또한 해당 모델을 학습하기 위한 효율적인 데이터셋을 구축한다. 모바일 화면에서 클릭 가능한 객체를 기준으로 데이터를 수집하여 총 24,937 개의 Annotation data 를 Text, Image, Button, Region 등 8 개의 카테고리로 세분화하였다.

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.