Journal of the Korean Institute of Intelligent Systems
/
v.8
no.2
/
pp.60-69
/
1998
This paper proposes a speech synthesis method using Fuzzy VQ, and then study how to make
choice of fuzziness value which optimizes (controls) the performance of FVQ in order to obtain the
synthesized speech which is closer to the original speech. When FVQ is used to synthesize a speech,
analysis stage generates membership function values which represents the degree to which an input
speech pattern matches each speech patterns in codebook, and synthesis stage reproduces a
synthesized speech, using membership function values which is obtained in analysis stage, fuzziness
value, and fuzzy-c-means operation. By comparsion of the performance of the FVQ and VQ
synthesizer with simmulation, we show that, although the FVQ codebook size is half of a VQ
codebook size, the performance of FVQ is almost equal to that of VQ. This results imply that, when
Fuzzy VQ is used to obtain the same performance with that of VQ in speech synthesis, we can reduce
by half of memory size at a codebook storage. And then we have found that, for the optimized FVQ
with maximum SQNR in synthesized speech, the fuzziness value should be small when the variance
of analysis frame is relatively large, while fuzziness value should be large, when it is small. As a
results of comparsion of the speeches synthesized by VQ and FVQ in their spectrogram of frequency
domain, we have found that spectrum bands(formant frequency and pitch frequency) of FVQ
synthesized speech are closer to the original speech than those using VQ.
Oh, Ki Young;Choi, Dong Won;Jang, Moon Soon;Lee, Ji Han;Kim, Sang Chul;Park, Jung Soo;Lee, Suk Woo;Kim, Hoon
Journal of The Korean Society of Emergency Medicine
/
v.28
no.5
/
pp.457-466
/
2017
Purpose: Traumatic brain injury (TBI) is a significant cause of morbidity and mortality worldwide. Severity of the initial insult is one of the most significant factors affecting outcome following TBI. In order to investigate the mechanisms of cellular injury and develop novel therapeutic strategies for TBI, we designed a standardized animal TBI model and evaluated histological and functional outcomes according to the degree of impact severity. Methods: Male adult C57Bl/6 mice underwent controlled cortical impact (CCI) at varying depths of deflection (1.0-2.0 mm). We performed hematoxylin and eosin staining at 7 days after recovery from TBI. Neurobehavioral characterization after TBI was analyzed by the Barnes maze test, passive avoidance test, open field test, rotarod test, tail suspension test, and light/dark test. Results: We observed a graded injury response according to the degree of deflection depths tested (diameter, 3 mm; velocity, 3 m/s; and duration, 500 ms) compared to sham controls. In the Barnes maze test, the severe TBI (2 mm depth) group showed reduced spatial memory as compared with the sham and mild TBI (1 mm depth) groups at 7 days after TBI. There was a significant difference in the results of the open field test and light/dark test among the three groups. Conclusion: Our findings demonstrate that the graded injury responses following TBI resulted in differential histopathological and behavioral outcomes in a mouse experimental CCI model. Thus, a model of CCI with histologic/behavioral outcome analysis may offer a reliable and convenient design for preclinical TBI research involving mice.
This study was performed in order to suggest the future model of Asian universities that could be used in the planning of the global competitive strategy. Futurologists forecasted the future of higher education using Harman Fan Scenario as like this. First, most current universities will be 'the satellite university' until 2015. Second, they also will replace 'the bookless university' until 2020. Third, they will be 'no calendar university' until 2025. And then they may be 'all have access university' until 2030. After 2030, futurologists prospected that almost universities based on off-line campus will be disappeared into the history. The analysis method of Harman fan scenario and applied scenarios were also used to "A study on the future scenario of Korean university". The predictive model and the alternative models were explored in a view point of students, enterprise, and government. Individuality with educational excellence are standardized for learner, profit and effectiveness are applied for enterpriser, and equality with welfare are adapted for national leader. Asian universities need to focus on bringing up the practical ability based on conscious and emotional education instead of knowledge based on memory. Also they need to enforce the specialized education that can create new jobs through convergence of interdisciplinary. Especially, Asian nations need to explore, to find the strengthen area of their universities compared with USA. And these area should be specialized. The convergency strategy between oriental medicine and informatics is a meaningful sample. Based on this point, a predicted with 3 alternative scenarios in a view point of equality were suggested for the future of Asian universities.
Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
Journal of the Korea Institute of Information Security & Cryptology
/
v.31
no.5
/
pp.875-888
/
2021
In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.
This paper studied the type and character of the Divinity in Korean shamanism. The study of the Divinity means the hierarchy of shamanism, the relationship between shamanism and divinity, and the comparison between shamanism and divinity. The study of the shamanistic divinity based on Kim Tae - Gon's collection of anthology by Shaman(1971). The Jaesugut was composed of the contents of the gods blessing human beings. The JaesuGut of Seoul vary from 10 to 18 depending on the author. The JaesuGut of Goseong consists of 8 Gut. The essence of the ritual gut is to pray for the peace of the individual by using the world which is not explained by reason and science. It is a reincarnation that reflects the world of experience that is stored in the memory of human being that both reason and science can not explain. And the desire to escape from fear was reflected in Jaesu Gut. Every Jaesu Gut in Seoul and Goseong has a main divinity. This main divinity is attached to the divinity in another Gut and becomes a subordination divinity. It also becomes a subordinate-subordination divinity to the another Gut. The gods of reincarnation are basically taken in the order of national security ${\rightarrow}$ local security ${\rightarrow}$ home security.
Church archives are the evidential instruments to remember church activity and important information aggregate which has administrative, legal, financial, historical, faithful value as the collective memory of church community. So it must be managed necessarily and the management orders are based on the Bible. The western churches which have a correct understanding about the importance of church records and management order have taken multilateral endeavor to create, manage church archives systematically. On the other hand, korean churches don't have the records management systems. Therefore, Records created in individual church are mostly managed unsystematically and exist as 'backlogs', finally, they are destructed without reasonable formalities. In those problems, the purpose of this study is to offer the way of records classification and disposition instrument with recognition that records management should be done from the time of creation or previous to it. As a concrete device for them, I tried to embody the function-based classification method and disposal schedule. I prefer the function-based classification and disposal schedule to the organization and function-based classification to present stable classification and disposal schedule, as we can say the best feature of the modern organization is multilateral and also churches have same aspect. For this study, I applied DIRKS(Designing and Implementing Recordkeeping Systems) manual which National Archives of Australia provide and guidelines in ICA/IRMT series to construct the theory of the function-based classification in individual churches. Through them, it was possible to present a model for preliminary investigation, analysis of business activity, records survey, disposal schedule. And I took an example of 'Myong Sung Presbyterian Church' which belong to 'The Presbyterian church in Korea'. I explained in detail codifying process and results of preliminary investigation in 'Myong Sung Presbyterian Church', analysis of business activity based on it, process of presenting the function-based classification and disposal schedule got from all those steps. For establishing disposal schedule, I planned 'General Disposal Schedule' and 'Agency Disposal Schedule' which categorized 'general function' and 'agency function' of an agency, according to DIRKS in Australia and ICA/IRMT. And for estimation of disposal date I had a thorough grasp of important records category presented in 'Constitution of General Assembly', interview to know the importance of tasks, and added examples of disposal schedule in western church archives. This study has significance that it was intended to embody 'the function-based classification' and 'disposal schedule' suitable for individual church, applying DIRKS in Australia and ICA/IRMT on absence of the theory or example which tried to present the function-based classification and disposal schedule for individual church. Also it is meaningful to present a model that can classify and disposal real records according to the function in individual church which has no recognition or way about records management.
Kum, Ran;Seo, Im Sun;Kim, Tae Hee;Hahn, Suk Won;Kim, Min Suk
Journal of the Korea Convergence Society
/
v.10
no.3
/
pp.373-382
/
2019
This study was performed to investigate the effects of creative teaching technique(CTT) on critical thinking disposition(CTD), problem solving process(PSP), and self-leadership(SL) in 5 majors of first to third grades in a college nursing department. CTT was developed to promote memory and practical ability. The study was conducted from August 1 to December 31 in 2017, and the survey was performed before and after applying the CTT. As a result, there was no difference in CTD, PSP, and SL in the first graders whom applied various teaching techniques to one subject. But CTD was 6.8point(p<0.001), PSP was 7.5~7.9point(p<0.001) and SL was 2.9~3.3point(p<0.001) improved in the second and third grades whom applied similar teaching techniques in two subjects. In order to improve the students' core competency, it is more effective for students to apply one or two methods repeatedly in several subjects than to apply various methods to one subject. Since the CTT was more effective in the group that selected the major depending on aptitude and interest, it is necessary to develop various teaching and learning strategies to enhance the interest in nursing major.
Journal of the Korea Academia-Industrial cooperation Society
/
v.19
no.11
/
pp.310-318
/
2018
Recently, the importance of big data analysis is increasing as a large amount of data is generated by various devices connected to the Internet with the advent of Internet of Things (IoT). Especially, it is necessary to analyze various large-scale IoT streaming sensor data generated in real time and provide various services through new meaningful prediction. This paper proposes a real-time indoor PM10 concentration prediction LSTM model based on streaming data generated from IoT sensor using AWS. We also construct a real-time indoor PM10 concentration prediction service based on the proposed model. Data used in the paper is streaming data collected from the PM10 IoT sensor for 24 hours. This time series data is converted into sequence data consisting of 30 consecutive values from time series data for use as input data of LSTM. The LSTM model is learned through a sliding window process of moving to the immediately adjacent dataset. In order to improve the performance of the model, incremental learning method is applied to the streaming data collected every 24 hours. The linear regression and recurrent neural networks (RNN) models are compared to evaluate the performance of LSTM model. Experimental results show that the proposed LSTM prediction model has 700% improvement over linear regression and 140% improvement over RNN model for its performance level.
In this paper, we propose the development of a Small $360^{\circ}$ Oral Scanner embedded board. The proposed small $360^{\circ}$ oral scanner embedded board consists of image level and transfer method changing part FPGA part, memory part and FIFO to USB transfer part. The image level and transmission mode change unit divides the MIPI format oral image received through the small $360^{\circ}$ oral cavity image sensor and the image sensor into low power signal mode and high speed signal mode and distributes them to the port and transfers the level shift to the FPGA unit. The FPGA unit performs functions such as $360^{\circ}$ image distortion correction, image correction, image processing, and image compression. In the FIFO to USB transfer section, the RAW data transferred through the FIFO in the FPGA is transferred to the PC using USB 3.0, USB 3.1, etc. using the transceiver chip. In order to evaluate the efficiency of the proposed small $360^{\circ}$ oral scanner embedded board, it has been tested by an authorized testing institute. As a result, the frame rate per second is over 60 fps and the data transfer rate is 4.99 Gb/second
In this study, we tried to improve the performance of the existing U-net-based deep learning rainfall prediction model, which can weaken the meaning of time series order. For this, ConvLSTM2D U-Net structure model considering temporal consistency of data was applied, and we evaluated accuracy of the ConvLSTM2D U-Net model using a RainNet model and an extrapolation-based advection model. In addition, we tried to improve the uncertainty in the model training process by performing learning not only with a single model but also with 10 ensemble models. The trained neural network rainfall prediction model was optimized to generate 10-minute advance prediction data using four consecutive data of the past 30 minutes from the present. The results of deep learning rainfall prediction models are difficult to identify schematically distinct differences, but with ConvLSTM2D U-Net, the magnitude of the prediction error is the smallest and the location of rainfall is relatively accurate. In particular, the ensemble ConvLSTM2D U-Net showed high CSI, low MAE, and a narrow error range, and predicted rainfall more accurately and stable prediction performance than other models. However, the prediction performance for a specific point was very low compared to the prediction performance for the entire area, and the deep learning rainfall prediction model also had limitations. Through this study, it was confirmed that the ConvLSTM2D U-Net neural network structure to account for the change of time could increase the prediction accuracy, but there is still a limitation of the convolution deep neural network model due to spatial smoothing in the strong rainfall region or detailed rainfall prediction.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.