• Title/Summary/Keyword: END

Search Result 27,412, Processing Time 0.053 seconds

Scheduling of Sporadic and Periodic Tasks and Messages with End-to-End Constraints (양극단 제약을 갖는 비주기, 주기 태스크와 메시지 스케줄링)

  • Oh Hoon;Park Hong Seong;Kim Hyoung Yuk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2005
  • The scheduling methods of the distributed real-time systems have been proposed. However, they have some weak points. They did not schedule both sporadic and periodic tasks and messages at the same time or did not consider the end-to-end constraints such as precedence relations between sporadic tasks. This means that system scheduling must guarantee the constraints of practical systems and be applicable to them. This paper proposes a new scheduling method that can be applied to more practical model of distributed real-time systems. System model consists of sporadic and periodic tasks with precedence relations and sporadic and periodic messages and has end-to-end constraints. The proposed method is based on a binary search-based period assignment algorithm, an end-to-end laxity-based priority assignment algorithm, and three kinds of schedulability analysis, node, network, and end-to-end schedulability analysis. In addition, this paper describes the application model of sporadic tasks with precedence constraints in a distributed real-time system, shows that existing scheduling methods such as Rate Monotonic scheduling are not proper to be applied to the system having sporadic tasks with precedence constraints, and proposes an end-to-end laxity-based priority assignment algorithm.

Hybrid CTC-Attention Network-Based End-to-End Speech Recognition System for Korean Language

  • Hosung Park;Changmin Kim;Hyunsoo Son;Soonshin Seo;Ji-Hwan Kim
    • Journal of Web Engineering
    • /
    • v.21 no.2
    • /
    • pp.265-284
    • /
    • 2021
  • In this study, an automatic end-to-end speech recognition system based on hybrid CTC-attention network for Korean language is proposed. Deep neural network/hidden Markov model (DNN/HMM)-based speech recognition system has driven dramatic improvement in this area. However, it is difficult for non-experts to develop speech recognition for new applications. End-to-end approaches have simplified speech recognition system into a single-network architecture. These approaches can develop speech recognition system that does not require expert knowledge. In this paper, we propose hybrid CTC-attention network as end-to-end speech recognition model for Korean language. This model effectively utilizes a CTC objective function during attention model training. This approach improves the performance in terms of speech recognition accuracy as well as training speed. In most languages, end-to-end speech recognition uses characters as output labels. However, for Korean, character-based end-to-end speech recognition is not an efficient approach because Korean language has 11,172 possible numbers of characters. The number is relatively large compared to other languages. For example, English has 26 characters, and Japanese has 50 characters. To address this problem, we utilize Korean 49 graphemes as output labels. Experimental result shows 10.02% character error rate (CER) when 740 hours of Korean training data are used.

A SCANNING ELECTRON MICROSCOPIC STUDY OF END-IN-END AND END-TO-END MICROVASCULAR ANASTOMOSIS IN THE RAT FEMORAL ARTERY (백서 대퇴동맥에서의 혈관함입문합술과 혈관단단문합술의 주사전자현미경적 비교연구)

  • kim, Uk-Kyu;Chung, In-Kyo
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.13 no.1
    • /
    • pp.16-29
    • /
    • 1991
  • The occurrence of thrombotic occlusion & endothelial injuries at the site of anastomosis have been considered as major problems in microvascular surgery. The purpose of this study was to ascertain whether a end-in-end(sleeve, telescope) anastomosis compared favorably with end-to-end anastomosis in healing procedures on the endothelium and to study the possibility of clinical application in end-in-end method. The microvascular anastomoses have been performed with end-in-end method in the femoral arteries of 20 rats group, also with end-to-end method on the same arteries of another 20 rats group, and then the four anastomosed vessels in subdivided groups on each group were taken after period of 1, 3, 7, 14, 21 days following by anastomoses for scanning electron microscope observation. The results were as following: 1. The patency rate was 90% in the end-in-end group and 85%in the end-to-end group and late thrombus occurred at 7, 14 days on both groups, which suggested -consistent monitoring of patency was required for two weeks at least. 2. Platelet aggregates at the site of anastomosis began to organize on post-operation 3 days and in the end-in-end group, the initially decreased lumen of inserted vessel was gradually increasing on 7 days due to atrophy of the medial layers. 3. Re-endothelialization was completed between 7 and 14 days in end-in-end group, whereas between 14 and 21 days in end-to-end group.

  • PDF

Design Optimization on End Coupling as a Power Transmission Component for Aluminum Hot Rolling Process (알루미늄 열간 압연공정의 동력 전달용 커플링에 대한 최적화 설계)

  • Lee, Hyun-Seung;Lee, Young-Shin
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2012
  • The End Coupling is main component of the aluminum hot roll process. The End Coupling is used for transmission of rotational power with heavy-duty load. Fracture of the End Coupling cause serious economic losses because an End Coupling is a very expensive component and it takes a long time to repair it. Therefore, preventing the destruction of the End Coupling is essential for ensuring a long mechanical life cycle. In this paper, the parametric study on the End Coupling was performed in order to minimize maximum stress under operation loads. To verify the interference of spindle assembly with modified End Coupling, kinematics simulation was performed by applying the various combination type and dynamic boundary condition of the spindle assembly. The interference of optimized model was not occurred during combination process and driving process. As a result of an optimum design for life extension on End Coupling, the maximum stress of modified End Coupling was lower than that of the initial model by 26%.

End-to-End Analysis to Audit Information Systems for Telecommunication Industry (통신산업의 정보시스템 감사를 위한 단대단 분석)

  • Lee, Joong Hee;Lee, Sangwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.325-327
    • /
    • 2013
  • Although, there are so much information for telecommunication companies to manipulate and handle. there are still many side-effects in the field of completeness while transmitting information among information systems. Especially, works related to End-to-End Reconciliation bring about side-effects. In this research, we establish a proposed model for end-to-end analysis. After an experiment in a business company, we analyze its experimental results.

  • PDF

DSON Architecture and Service Model for End-to-End QoS Guarantee in Next Generation Home Network (차세대 홈 네트워크 환경에서의 end-to-end QoS 보장을 위한 DSON 구조와 서비스 모델)

  • Kim, Do-Won;Kim, Eung-Kyu;Kim, Yang-Jung;Chong, Il-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.333-336
    • /
    • 2009
  • DSON is a service overlay network architecture that can guarantee end-to-end quality of service to home network area. DSON makes service possible to be provided dynamically. This paper gives service model and scenario using DSON architecture.

  • PDF

Development of a Dialogue System Model for Korean Restaurant Reservation with End-to-End Learning Method Combining Domain Specific Knowledge (도메인 특정 지식을 결합한 End-to-End Learning 방식의 한국어 식당 예약 대화 시스템 모델 개발)

  • Lee, Dong-Yub;Kim, Gyeong-Min;Lim, Heui-Seok
    • 한국어정보학회:학술대회논문집
    • /
    • 2017.10a
    • /
    • pp.111-115
    • /
    • 2017
  • 목적 지향적 대화 시스템(Goal-oriented dialogue system)은 텍스트나 음성을 통해 특정한 목적을 수행할 수 있는 시스템이다. 최근 RNN(recurrent neural networks)을 기반으로 대화 데이터를 end-to-end learning 방식으로 학습하여 대화 시스템을 구축하는데에 활용한 연구가 있다. End-to-end 방식의 학습은 도메인에 대한 지식 없이 학습 데이터 자체만으로 대화 시스템 구축을 위한 학습이 가능하다는 장점이 있지만 도메인 지식을 학습하기 위해서는 많은 양의 데이터가 필요하다는 단점이 존재한다. 이에 본 논문에서는 도메인 특정 지식을 결합하여 end-to-end learning 방식의 학습이 가능한 Hybrid Code Network 구조를 기반으로 한국어로 구성된 식당 예약에 관련한 대화 데이터셋을 이용하여 식당 예약을 목적으로하는 대화 시스템을 구축하는 방법을 제안한다. 실험 결과 본 시스템은 응답 별 정확도 95%와 대화 별 정확도 63%의 성능을 나타냈다.

  • PDF

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Secure Electronic Financial Services using End-to-End Encryption (종단간 암호화(End-to-End Encryption)를 이용한 전자금융거래 정보보호 강화)

  • Kim, In-Seok;Lee, Su-Mi;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.65-71
    • /
    • 2007
  • Recently, security softwares are the program that is to protect the users from hackers in using electronic financial services. However heackers commit financial crimes to extort asserts using known hacking skills. In our paper, we analyse vulnerability that can be used to hook financial information in user application area and explain end-to-end encryption which is able to be provided by interacting keyboard security program and PKI application program.

  • PDF

Cross-Layer and End-to-End Optimization for the Integrated Wireless and Wireline Network

  • Gong, Seong-Lyong;Roh, Hee-Tae;Lee, Jang-Won
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.554-565
    • /
    • 2012
  • In this paper, we study a cross-layer and end-to-end optimization problem for the integrated wireless and wireline network that consists of one wireline core network and multiple wireless access networks. We consider joint end-to-end flow control/distribution at the transport and network layers and opportunistic scheduling at the data link and physical layers. We formulate a single stochastic optimization problem and solve it by using a dual approach and a stochastic sub-gradient algorithm. The developed algorithm can be implemented in a distributed way, vertically among communication layers and horizontally among all entities in the network, clearly showing what should be done at each layer and each entity and what parameters should be exchanged between layers and between entities. Numerical results show that our cross-layer and end-to-end optimization approach provides more efficient resource allocation than the conventional layered and separated optimization approach.