• Title/Summary/Keyword: Data Collection Protocol

Search Result 125, Processing Time 0.026 seconds

Developing a Korean Standard Speech DB (한국인 표준 음성 DB 구축)

  • Shin, Jiyoung;Jang, Hyejin;Kang, Younmin;Kim, Kyung-Wha
    • Phonetics and Speech Sciences
    • /
    • v.7 no.1
    • /
    • pp.139-150
    • /
    • 2015
  • The data accumulated in this database will be used to develop a speaker identification system. This may also be applied towards, but not limited to, fields of phonetic studies, sociolinguistics, and language pathology. We plan to supplement the large-scale speech corpus next year, in terms of research methodology and content, to better answer the needs of diverse fields. The purpose of this study is to develop a speech corpus for standard Korean speech. For the samples to viably represent the state of spoken Korean, demographic factors were considered to modulate a balanced spread of age, gender, and dialects. Nine separate regional dialects were categorized, and five age groups were established from individuals in their 20s to 60s. A speech-sample collection protocol was developed for the purpose of this study where each speaker performs five tasks: two reading tasks, two semi-spontaneous speech tasks, and one spontaneous speech task. This particular configuration of sample data collection accommodates gathering of rich and well-balanced speech-samples across various speech types, and is expected to improve the utility of the speech corpus developed in this study. Samples from 639 individuals were collected using the protocol. Speech samples were collected also from other sources, for a combined total of samples from 1,012 individuals.

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network (Ad Hoc 네트워크를 위한 안전한 경로발견 프로토콜 제안)

  • Park Young-Ho;Kim Jin-Gyu;Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.3
    • /
    • pp.30-37
    • /
    • 2005
  • Ad hoc network is a collection of mobile nodes without using any infrastructure, it , is using in the various fields. Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose two secure route-discovery protocols. One is a protocol using hash function. This protocol is weak in active attack but has some merits such as small data of transmission packet and small computation at each hop. The other is a protocol using hash function and public key cryptography. This protocol is strong in active attack.

  • PDF

The Effects of Applying a Home Care Protocol on the Nursing Care of Stroke Patients (뇌졸중환자의 가정간호 프로토콜 적용 효과)

  • Kang Hyun-Sook;Kim Jeong-Hwa;Kwon Hei-Jeoung;Sok So-Hyun
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.5 no.1
    • /
    • pp.7-17
    • /
    • 1998
  • Since patients who have suffered from strokes have chronic health problems, the development of a protocol for home care nursing is required. Therefore, this study was done to test the effects of such a protocol on stroke patients. This study was conducted by using a single group pre-post design. The subjects for the study were 13 home care nurses and 30 home care patients who had a stroke. Data collection was done from October 1997 to February 1998. The collected data was analyzed using the Wilcoxon signed rank test and paired t-test and the results were as follows : 1. The first hypothesis that 'working satisfaction of home nurses would be higher after using the home care protocol' was supported. 2. The second hypothesis that 'patients' satisfaction would be higher after using the home care protocol' was rejected. 3. The third hypothesis that 'the level of ADL of patients would be higher after using the home care protocol' was supported. In conclusion, by using a home care protocol, the satisfaction of nurses' work and the ADL of patients increased, and the patients' satisfaction also increased without statistical significance. The above results confirm that the application of a home care protocol is very effective. Thus, this protocol can be helpful in the quality care of stroke patients. Therefore, developing and organizing protocols, according to health problem, can be useful for beginner nurses who interact with high risk patients.

  • PDF

M2M Gateway based on CoAP in SG Environment (SG 환경에서 CoAP 기반 M2M 게이트웨이)

  • Shin, In-Jae;Park, Jee-Won;Lee, Sang-Hoon;Song, Byung-Kwen
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.47-48
    • /
    • 2015
  • As the power system develops rapidly into a smarter and more flexible state, so must the communication technologies that support it. Machine to machine (M2M) communication in Smart Grid environment has been discussed in European Telecommunications Standards Institute (ETSI). The power system is not easily replaceable, due to system replacement cost. The M2M gateway is required in other to improve interoperability in M2M environment. The Distributed Network Protocol 3.0 (DNP3.0) is the most important standard in the SCADA systems for the power. It has been used for device data collection/control in Substation Systems, Distribution Automation System. If the DNP3.0 data model is combined with a set of contemporary web protocols, it can result in a major shift. We selected Constrained Application Protocol (CoAP) based on RESTful as M2M protocol. It is a specialized web transfer protocol for use with constrained nodes and constrained networks. We have used the OPNET Modeler 17.1 in order to verity the SOAP versus CoAP. In this paper, we propose the CoAP-based M2M Gateway to Distribution Automation system using DNP3.0 in Smart Grid Environment.

  • PDF

Adaptive Success Rate-based Sensor Relocation for IoT Applications

  • Kim, Moonseong;Lee, Woochan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3120-3137
    • /
    • 2021
  • Small-sized IoT wireless sensing devices can be deployed with small aircraft such as drones, and the deployment of mobile IoT devices can be relocated to suit data collection with efficient relocation algorithms. However, the terrain may not be able to predict its shape. Mobile IoT devices suitable for these terrains are hopping devices that can move with jumps. So far, most hopping sensor relocation studies have made the unrealistic assumption that all hopping devices know the overall state of the entire network and each device's current state. Recent work has proposed the most realistic distributed network environment-based relocation algorithms that do not require sharing all information simultaneously. However, since the shortest path-based algorithm performs communication and movement requests with terminals, it is not suitable for an area where the distribution of obstacles is uneven. The proposed scheme applies a simple Monte Carlo method based on relay nodes selection random variables that reflect the obstacle distribution's characteristics to choose the best relay node as reinforcement learning, not specific relay nodes. Using the relay node selection random variable could significantly reduce the generation of additional messages that occur to select the shortest path. This paper's additional contribution is that the world's first distributed environment-based relocation protocol is proposed reflecting real-world physical devices' characteristics through the OMNeT++ simulator. We also reconstruct the three days-long disaster environment, and performance evaluation has been performed by applying the proposed protocol to the simulated real-world environment.

The study on SLA system architecture for IP TV (IP TV를 위한 SLA 시스템 구조에 관한 연구)

  • Kim, Seong-Hwan;Lee, Gil-Haeng
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.47-52
    • /
    • 2005
  • In this paper we describe SLA metrics and software architecture for newly upcoming IP TV service. Firstly we show the general description for IP TV. This consists of brief description of IP TV, the general figure of configuration and elements of IP TV network and communication protocol stack of IP TV data transmission for deriving communication quality parameter. And we propose SLA metrics depending on quality measurement point. According to the measurement point the measurable SLA metrics are different. The total view of the IP TV SLA measurement and management architecture is shown. When the quality measurement point is the routers that consist of internet node, the IP media NMS is the quality collection system. And when the quality measurement point is the IP TV STB(Set-Top Box), the IP media collector and Quality Collection Server are the quality collection system. And we show the software block diagram of IP TV SLA processing system and the other related network management systems.

  • PDF

A systemic review of literature in clinical practice research for nursing students

  • Kim, Jungae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.39-46
    • /
    • 2022
  • This study is an attempted content analysis study to analyze recent studies on clinical practice of nursing college students to identify problems with clinical practice and provide evidence for desirable clinical practice. For data collection, a total of 14 papers published in academic journals between 2017 and 2021 were selected. The analysis method was performed according to the systematic review reporting guidelines presented by Cochrane Collaboration and the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) group. As a result of the analysis, two themes, Four sub-themes, and seventeen concepts were derived, and the clinical practice study of nursing college students showed the necessity of standardized clinical practice protocol regulations for nursing college students and respect for patient human rights. Based on the above research results, it is proposed to prepare a nursing and clinical practice protocol that can clearly present the role of nursing college students during clinical practice.

Road Surface Data Collection and Analysis using A2B Communication in Vehicles from Bearings and Deep Learning Research

  • Young-Min KIM;Jae-Yong HWANG;Sun-Kyoung KANG
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.4
    • /
    • pp.21-27
    • /
    • 2023
  • This paper discusses a deep learning-based road surface analysis system that collects data by installing vibration sensors on the 4-axis wheel bearings of a vehicle, analyzes the data, and appropriately classifies the characteristics of the current driving road surface for use in the vehicle's control system. The data used for road surface analysis is real-time large-capacity data, with 48K samples per second, and the A2B protocol, which is used for large-capacity real-time data communication in modern vehicles, was used to collect the data. CAN and CAN-FD commonly used in vehicle communication, are unable to perform real-time road surface analysis due to bandwidth limitations. By using A2B communication, data was collected at a maximum bandwidth for real-time analysis, requiring a minimum of 24K samples/sec for evaluation. Based on the data collected for real-time analysis, performance was assessed using deep learning models such as LSTM, GRU, and RNN. The results showed similar road surface classification performance across all models. It was also observed that the quality of data used during the training process had an impact on the performance of each model.

A Study on Data Collection Protocol with Homomorphic Encryption Algorithm (동형 암호의 데이터 수집 프로토콜 적용 방안 연구)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.42-50
    • /
    • 2021
  • As the Internet environment develops, data-analysis-based applications have been widely and extensively used in the past decade. However, these applications potentially have a privacy problem in that users' personal information may be leaked to unauthorized parties. To tackle such a problem, researchers have suggested several techniques including data perturbation and cryptography. The homomorphic encryption algorithm is a relatively new cryptography technology that allows arithmetic operations for encrypted values as it is without decryption. Since original values are not required, we believe that this method provides better privacy protection than other existing solutions. In this work, we propose to apply a homomorphic encryption algorithm that protects personal information while enabling data analysis.

Solar-CTP : An Enhanced CTP for Solar-Powered Wireless Sensor Networks Using a Mobile Sink (Solar-CTP : 모바일 싱크 기반 태양 에너지 수집형 무선 센서 네트워크를 위한 향상된 CTP)

  • Cheong, Seok Hyun;Kang, Minjae;Noh, Dong Kun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.4
    • /
    • pp.77-82
    • /
    • 2020
  • Wireless sensor networks (WSNs) suffer from not only a short lifetime due to limited energy but also an energy imbalance between nodes close to the sink and others. In order to fundamentally solve the short lifetime, recent studies utilize the environmental energy such as solar power. Additionally, WSNs using mobile sinks are being studied to address the energy imbalance problem. This paper proposes an improved CTP (Collection Tree Protocol) scheme which uses these two approaches simultaneously. Basically, it is based on a CTP scheme which is a very popular data collection strategy designed for the typical battery-based WSNs with a fixed sink. Therefore, we tailored it for solar-powered WSNs with a mobile sink. Performance verification confirms that our scheme reduces the number of blackout nodes significantly compared to the typical CTP, thus increases the amount of data collected by the sink.