• 제목/요약/키워드: 메커니즘 생성

Search Result 615, Processing Time 0.027 seconds

Voice-to-voice conversion using transformer network (Transformer 네트워크를 이용한 음성신호 변환)

  • Kim, June-Woo;Jung, Ho-Young
    • Phonetics and Speech Sciences
    • /
    • v.12 no.3
    • /
    • pp.55-63
    • /
    • 2020
  • Voice conversion can be applied to various voice processing applications. It can also play an important role in data augmentation for speech recognition. The conventional method uses the architecture of voice conversion with speech synthesis, with Mel filter bank as the main parameter. Mel filter bank is well-suited for quick computation of neural networks but cannot be converted into a high-quality waveform without the aid of a vocoder. Further, it is not effective in terms of obtaining data for speech recognition. In this paper, we focus on performing voice-to-voice conversion using only the raw spectrum. We propose a deep learning model based on the transformer network, which quickly learns the voice conversion properties using an attention mechanism between source and target spectral components. The experiments were performed on TIDIGITS data, a series of numbers spoken by an English speaker. The conversion voices were evaluated for naturalness and similarity using mean opinion score (MOS) obtained from 30 participants. Our final results yielded 3.52±0.22 for naturalness and 3.89±0.19 for similarity.

Self-assembly of ZnO Stripes Prepared by Anodization in an Ethanolic Sulfuric Acid (에탄올/황산 혼압액에서 양극산화법을 이용한 자기정렬된 ZnO 줄무늬 구조 제조 연구)

  • Kim, Sung Joong;Choi, Jinsub
    • Korean Chemical Engineering Research
    • /
    • v.46 no.4
    • /
    • pp.686-691
    • /
    • 2008
  • There are no many research reports on the preparation of ZnO by electrochemical oxidation since the zinc oxide is very easily dissolved in an acidic or basic environment, even though zinc oxides have attracted many attentions because of their optical/electrical properties. In this paper, we describe the fabrication of self-ordered stripes of ZnO by anodization of Zn in an ethanolic sulfuric acid. The formation of stripes of ZnO originating from Zn is attributed to water-selective dissolution of ZnO during anodization. We study in detail the effects of concentration of $H_2SO_4$, applied potential, anodization time, and addition of a small amount of water on the fabrication of stripes of ZnO. Mechanisms for the fabrication of ZnO stripes are discussed in terms of the above-mentioned effects.

Particle-Size Distribution Dependent upon Crushing Mechanism and Crushing Circuit (파쇄 메카니즘과 파쇄회로에 따른 입도분포)

  • Choi, Do-Young;Kim, Wan-Tae;Kim, Sang-Bae
    • Journal of the Mineralogical Society of Korea
    • /
    • v.23 no.4
    • /
    • pp.297-303
    • /
    • 2010
  • We report the particle-size distribution and comminution charactersitics of dolomite depending upon crushing equipment (hammer crusher and roll crusher) and crushing circuit (open and closed). The quantity of fine particles (< 100 mesh) produced by hammer crusher was 34 wt.% which is about three times that by roll crusher. The quantity of 14~25 mesh size fraction by roll crusher was 20 wt.% higher than that produced by hammer crusher. 80 wt.% of the crushing products by hammer crushing was under 35 mesh in size, while the particles produced by roll crushing were relatively coarse. The particle size of both the hammer and roll crushers decreased by employing closed crusing circuit in comparison to open circuit. Products of required particle-size were obtained effectively depending on appropriate crushing equipment and crushing circuit.

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

A Measurements on the Characteristics of Electron Energy Distribution Function of Radio-Frequency Inductively Couples Plasma (고주파 유도결합 플라즈마의 전자에너지 분포함수 계측에 관한 연구)

  • 하장호;전용우;최상태;박원주;이광식
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.13 no.4
    • /
    • pp.82-86
    • /
    • 1999
  • Electron Energy Distribution Function(EEDF) were treasured In Radio-Frequency Inductively Coupled Plasma(RFlCP) using a probe rrethocl Measurerrents were conducted in argon discharge for pressure from 10[mTorr] to 4O[mTorr] and input rf power from 100[W] to 600[W] and flow rate from 3[sccm] to 12[sccm]. Spatial distribution of electron energy distribution function were measured for discharge with same aspoct ratio (R/L=2). Electron energy distribution function strongly depended on both pressure and power. Electron energy distribution function increased with increasing flow rate. Radial distribution of the electron energy distribution function were peaked in the plasma center. Normal distribution of the electron energy distribution function were peaked in the center between quartz plate and substrate. From the results, we can find out the generation mechanism of Radio Frequency Inductively Coupled Plasma. And these results contribute the application of a simple Inductively Coupled Plasma(ICP).a(ICP).

  • PDF

Design of C-shape Sharp Turn Trajectory using Neural Networks for Fish Robot (신경회로망을 사용한 물고기 로봇의 빠른 방향 전환 궤적 설계)

  • Park, Hee-Moon;Park, Jin-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.510-518
    • /
    • 2014
  • In this study, in order to improve and optimize the performance of the turning mechanism for a fish robot in the fluid, we propose the tail joint trajectories using neural networks to mimic the CST(C-shape Sharp Turn) patterns of a real fish which is optimized in the natural environment. In order to mimic the CST patterns of a fish, we convert the sequential recording CST patterns into the coordinate data, and change the numerical coordinate data into a functions. We change the motion functions to the relative joint angles which is adapted to suit robot's shape and data. However, these relative joint trajectories obtained by the sequential recording of the carp have low-precision. It is difficult to apply to the control of a fish robot. Therefore, the relative joint trajectories are interpolated using neural networks with superior generalization ability and applied to the fish robot. we have found that the proposed method using neural networks is superior to ones using high-order polynomial equation through the computer simulations.

A Key Recovery Mechanism for Reliable Group Key Management (신뢰성 있는 그룹키 관리를 위한 키 복구 메커니즘)

  • 조태남;김상희;이상호;채기준;박원주;나재훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.705-713
    • /
    • 2003
  • For group security to protect group data or to charge, group keys should be updated via key update messages when the membership of group changes. If we lose these messages, it is not possible to decrypt the group data and so this is why the recovery of lost keys is very significant. Any message lost during a certain member is logged off can not be recovered in real-time. Saving all messages and resending them by KDC (Key Distribution Center) not only requests large saving spaces, but also causes to transmit and decrypt unnecessary keys. This paper analyzes the problem of the loss of key update messages along with other problems that may arise during member login procedure, and also gives an efficient method for recovering group keys and auxiliary keys. This method provides that group keys and auxiliary keys can be recovered and sent effectively using information stored in key-tree. The group key generation method presented in this paper is simple and enable us to recover any group key without storing. It also eliminates the transmissions and decryptions of useless auxiliary keys.

Kinetics and hydrolysis mechanism of insecticide O,O-diethyl-O-(1-phenyl-3-trifluoromethylpyrazol-5-yl)phosphorothioate (Flupyrazofos) (살충제 O,O-diethyl-O-(1-phenyl-3-trifluoromethylpyrazol-5-yl)-phosphorothioate(Flupyrazofos)의 가수분해 반응 메커니즘)

  • Sung, Nack-Do
    • The Korean Journal of Pesticide Science
    • /
    • v.6 no.3
    • /
    • pp.218-223
    • /
    • 2002
  • The rate of hydrolysis of insecticide, O,O-diethyl-O-(1-phenyl-3-trifluoromethylpyrazol-5-yl)phosphorothioate (Flupyrazofos) have been investigated in 25% (v/v) aqueous dioxane (${\mu}=0.1M$) at $45^{\circ}C$. The hydrolysis mechanism of flupyrazofos proceeds through the specific acid ($A_{AC}2$) catalysis below pH 4.0, specific base ($B_{AC}2$) catalysis above pH 11.0 and general acid & base ($B_{AC}2$) catalysis between pH 5.0 and pH 10.0 via trigonal-bipyramidal ($d^2sp^3$) intermediate as evidence by solvent effect ($|m|{\ll}|{\ell}|$), rate equation ($kt=ko+k_H+ [H_3O^+]+k_{OH}[OH^-]$) and product analysis. The half-life ($T\frac{1}{2}$) of hydrolytic degradation in neutral media at $45^{\circ}C$ was ca. 3 months.

Numerical simulations of turbulent flow through submerged vegetation using LES (LES를 이용한 침수식생을 통과하는 난류흐름 수치모의)

  • Kim, Hyung Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6305-6314
    • /
    • 2015
  • This study presents numerical simulations of mean flow and turbulence structure of an open channel with submerged vegetation. Filtered Navier-Stokes equations are solved using large-eddy simulation (LES). The immersed boundary method (IBM) is employed based on a Cartesian grid. The numerical result is compared with experimental data of Liu et al. (2008) and shows that simulated results coincided reasonably with experimental data within the average error of 10%. Strong vortices are generated at the interface between vegetated and non-vegetated regions with spanwise extent. The generation of turbulence induced by shear at the interface is interfered with wake turbulence, resulting turbulence intensity maximum. Turbulence produced by shear affects the flow in vegetated region and the penetration depth increases with an increase in the submergence ratio. This result can be used to understand sediment transport mechanisms in the vegetated region.