• Title/Summary/Keyword: voice verification

Search Result 75, Processing Time 0.027 seconds

Traffic Capacity Analysis of the Digital Switching System (전전자 교환기의 트래픽 용량 분석)

  • Lee, Gang-Won;Park, Yeon-Gi;Seo, Jae-Jun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.13 no.2
    • /
    • pp.17-34
    • /
    • 1987
  • Modern telecommunication switching systems are SPC (Stored Program Control) machines handling voice, data and other kinds of traffic, in an environment which tends to be fully digital switching and transmission. The throughput of such systems is determined by the real time capacity of its centralized or distributed control processors and by the traffic capacity of the switching network. Designers must verify the traffic and call processing capacity of the switching system and check its performance under traffic load before it is put into service. Verification of traffic and call processing capacity of switching systems is one of the problems treated by teletraffic studies; teletraffic studies are based on stochastic process, queueing theory, simulations and other quantitative methods of decision making. This paper reviews the general methodologies to evaluate the throughput and performance of the digital switching system. TDX-10, which is a fully digital switching system under development in ETRI, is employed to give illustrative examples of the methodologies discussed in this paper.

  • PDF

IP-PBX System of RasPBX-Based (RasPBX 기반의 IP-PBX 시스템)

  • Jeong, Dae-Jin;Song, Hyun-Ok;Jung, Hoe-kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1131-1136
    • /
    • 2015
  • VoIP and IP Telephony telephony technology development is a growing by easy to using IP-PBX by using phone from using existing lines rather than the internet. IP-PBX do not use the phone line from phone work for many companies and institutions of management costs reduce as provides similar to regular phone line quality. But IP-PBX to introduce for need to be the initial cost on is should buy for expensive hardware equipment or commercial software. In this paper, suggest way to introduce IP-PBX do not buy expensive hardware equipment or commercial software. Suggest IP-PBX on designed and implement for IP-PBX server using Raspberry Pi and Asterisk. And verification treatise on the suitability of conducted by voice calls based on IP-PBX between PC and a Smartphone

A Study on the Man Disguise's Clothes in the Female Kukkuk and Takarazuka Revue (여성 국극(女性國劇)과 다카라즈카 가극의 남장(男裝) 의상에 관한 연구)

  • Kim, Hee-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.3 s.68
    • /
    • pp.510-524
    • /
    • 2007
  • There is something common between the Korean female Kukkuk and the Japanese Takarazuka Revue in that actors are all females and love is the main theme. Some of the females should play men's roles, so they are described as ideal men and are more manly than real men, and female audiences are attracted by them. It is hard for actresses to play men's roles-they have to stretch open their shoulders, walk with long steps and produce a deep voice. They put on a makeup a little exaggeratedly to perfectly disguise themselves as men and express strong images-some red tone makeup on their face, thick eyebrows with their ends upward, thick eye lines to make eyes seem bigger and stronger, and thick side whiskers. On the contrary, a makeup for female characters is softer to highlight femininity with thin penciled hair parted and braided on the sides of the face. The Takarazuka Revue's students are divided into male characters and female ones from the regular course of music schools, and they select their roles in consideration of their height and range of voice, mainly based on their wish. In case of male characters, they need a long career and verification of ability to be the best. Females playing men's roles and showing their manliness are violation of a social custom standardizing the character of males and females and are the reverse of roles expected by a society or a culture. A world experienced by these plays is a kind of revolt breaking the taboo of the patriarchal system.

  • PDF

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

The Digital Redundancy Design for Back-up Mode Operation of Aviation Intercom (항공용 인터콤의 백업 모드 운용을 위한 디지털 방식의 이중화 설계)

  • Jeong, Seong-jae;Cho, Kyung-hak;Kim, Dong-hyouk;Lee, Seong-woo
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.358-364
    • /
    • 2022
  • The Inter Communication System for avionics is in charge of processing all voice signals that internal calls between Pilot and Co-pilot, internal calls between Pilots and Crews, external calls through communication equipment such as Ultra/Very High Frequency Receiver/Transmitter(U/VHF RT), audio signal monitoring for navigation and mission equipment such as VHF Omnidirectional Range/Instrument Landing System(VOR/ILS), Tactical Air Navigation(TACAN), audio signal output for voice recording to Flight Data Recorder(FDR) and Data Transfer System(DTS), and warning/caution audio signal generate about the status and threat of aircraft. Because Inter Communication System for avionics is sensitive to noise in the case of analog audio signals, a redundant design that can protect audio signal from electromagnetic noise inside/outside of aircraft is required for the mission of pilots and crews. In this paper, Normal/Back-up operation mode and redundancy design plan based on digital method for the redundancy of the digital Inter Communication System for avionics and manufacturing, verification results are described.

Morphology Representation using STT API in Rasbian OS (Rasbian OS에서 STT API를 활용한 형태소 표현에 대한 연구)

  • Woo, Park-jin;Im, Je-Sun;Lee, Sung-jin;Moon, Sang-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.373-375
    • /
    • 2021
  • In the case of Korean, the possibility of development is lower than that of English if tagging is done through the word tokenization like English. Although the form of tokenizing the corpus by separating it into morpheme units via KoNLPy is represented as a graph database, full separation of voice files and verification of practicality is required when converting the module from graph database to corpus. In this paper, morphology representation using STT API is shown in Raspberry Pi. The voice file converted to Corpus is analyzed to KoNLPy and tagged. The analyzed results are represented by graph databases and can be divided into tokens divided by morpheme, and it is judged that data mining extraction with specific purpose is possible by determining practicality and degree of separation.

  • PDF

Improvement of User Recognition Rate using Multi-modal Biometrics (다중생체인식 기법을 이용한사용자 인식률 향상)

  • Geum, Myung-Hwan;Lee, Kyu-Won;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1456-1462
    • /
    • 2008
  • In general, it is known a single biometric-based personal authentication has limitation to improve recognition rate due to weakness of individual recognition scheme. The recognition rate of face recognition system can be reduced by environmental factor such as illumination, while speaker verification system does not perform well with added surrounding noise. In this paper, a multi-modal biometric system composed of face and voice recognition system is proposed in order to improve the performance of the individual authentication system. The proposed empirical weight sum rule based on the reliability of the individual authentication system is applied to improve the performance of multi-modal biometrics. Since the proposed system is implemented using JAVA applet with security function, it can be utilized in the field of user authentication on the generic Web.

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Service Quality Measurement and Comparison of Mobile Internet Telephony Services over WiBro and HSDPA (와이브로와 HSDPA를 통한 모바일 인터넷 전화 서비스 품질 측정 및 비교)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • The quality management for mobile internet voice services currently being used widely cannot be achieved by the conventional quality management depending on a specific measurement equipment. For more systematic quality management, a real-time or preventive quality management scheme is proposed. The proposed scheme required a quality management software installed in a service user's terminal. In order to implement and realize the proposed scheme, it is a very important issue to ensure the reliability of the measurement results from the developed quality management software. Therefore, we have performed a large number of tests to verify the reliability of the software and discuss on the results in this paper.

A study of SDN/SON-based emergency communications systemprovisioning for nuclear power plant under extreme natural disaster (극한 자연재해 상황 하의 SDN/SON 기반 원자력발전소 비상통신망 구축방안 연구)

  • Choi, Taesang;Yoon, Sangsik;Lee, Junkyung;Cho, Yongsu;Lee, Sangjin
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.31-39
    • /
    • 2019
  • This paper introduces our research results of SDN/SON-based emergeny communications system for nuclear power plant under extreme natural diaster like Fukusima nuclear power plant incident. In such a extreme situation, nuclear power plant operational staffs which do not have technical knowledge of network provisioning and operations have to deploy the emergency network. Thus our proposed system provides capabilities to provision an emergency network autonomically and enable voice and data services. It also describes our PoC system developed based on the proposed core technology and architecture with the results of system verification testing.