• Title/Summary/Keyword: coding history

Search Result 43, Processing Time 0.028 seconds

Coding History Detection of Speech Signal using Deep Neural Network (심층 신경망을 이용한 음성 신호의 부호화 이력 검출)

  • Cho, Hyo-Jin;Jang, Won;Shin, Seong-Hyeon;Park, Hochong
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.86-92
    • /
    • 2018
  • In this paper, we propose a method for coding history detection of digital speech signal. In digital speech communication and storage, the signal is encoded to reduce the number of bits. Therefore, when a speech signal waveform is given, we need to detect its coding history so that we can determine whether the signal is an original or an coded one, and if coded, determine the number of times of coding. In this paper, we propose a coding history detection method for 12.2kbps AMR codec in terms of original, single coding, and double coding. The proposed method extracts a speech-specific feature vector from the given speech, and models the feature vector using a deep neural network. We confirm that the proposed feature vector provides better performance in coding history detection than the feature vector computed from the general spectrogram.

Analysis of ChatGPT's Coding Capabilities in Foundational Programming Courses (기초 프로그래밍 과목에서의 ChatGPT의 코딩 역량 분석)

  • Nah, Jae-Ho
    • Journal of Engineering Education Research
    • /
    • v.26 no.6
    • /
    • pp.71-78
    • /
    • 2023
  • ChatGPT significantly broadens the application of artificial intelligence (AI) services across various domains, with one of its primary functions being assistance in programming and coding. Nevertheless, due to the short history of ChatGPT, there have been few studies analyzing its coding capabilities in Korean higher education. In this paper, we evaluate it using exam questions from three foundational programming courses at S University. According to the experimental results, ChatGPT successfully generated Python, C, and JAVA programs, and the code quality is on par with that of high-achieving students. The powerful coding capabilities of ChatGPT imply the need for a strict prohibition of its usage in coding tests; however, it also suggests significant potential for enhancing practical exercises in the educational aspect.

Development of SW Education Model based on HVC Learning Strategy for Improving Computational Thinking (컴퓨팅 사고 함양을 위한 HVC 학습전략 기반 SW교육모델 개발)

  • Sung, Younghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.5
    • /
    • pp.583-593
    • /
    • 2017
  • In order to overcome the difficulties of programming education for beginners, various research strategies such as UMC(Use-Modify-Create), design based learning, discovery learning and play learning are applied. In this study, we developed a HVC(History-VR Coding-Collaboration) learning strategy model for the improvement of learner's computational thinking. The HVC model is composed of a combination module of block type. We developed a 12th session storytelling - based virtual reality programming curriculum. As a result, HVC model and SW education program showed significant difference in improvement of learner's computational thinking.

Accessory auricle: Classification according to location, protrusion pattern and body shape

  • Hwang, Jungil;Cho, Jaeyoung;Burm, Jin Sik
    • Archives of Plastic Surgery
    • /
    • v.45 no.5
    • /
    • pp.411-417
    • /
    • 2018
  • Background Accessory auricles (AAs) are common congenital anomalies. We present a new classification according to location and shape, and propose a system for coding the classifications. Methods This study was conducted by reviewing the records of 502 patients who underwent surgery for AA. AAs were classified into three anatomical types: intraauricular, preauricular, and buccal. Intraauricular AAs were divided into three subtypes: intracrural, intratragal, and intralobal. Preauricular AAs were divided into five subtypes: precrural, superior pretragal, middle pretragal, inferior pretragal, and prelobal. Buccal AAs were divided into two subtypes: anterior buccal and posterior buccal. AAs were also classified according to their protrusion pattern above the surrounding surface: pedunculated, sessile, areolar, remnant, and depressed. Pedunculated and sessile AAs were subclassified as spherical, ovoid, lobed, and nodular, according to their body shape. Cartilage root presence and family history of AA were reviewed. A coding system for these classifications was also proposed. Results The total number of AAs in the 502 patients was 1,003. Among the locations, the superior pretragal subtype (27.6%) was the most common. Among the protrusion patterns and shapes, pedunculated ovoid AAs were the most common in the preauricular (27.8%) and buccal areas (28.0%), and sessile lobed AAs were the most common in the intraauricular area (48.7%). The proportion of AAs with a cartilage root was 78.4%, and 11% of patients had a family history. The most common type of preauricular AA was the superior pretragal pedunculated ovoid AA (13.2%) with a cartilage root. Conclusions This new system will serve as a guideline for classifying and coding AAs.

Video Coding Method Using Visual Perception Model based on Motion Analysis (움직임 분석 기반의 시각인지 모델을 이용한 비디오 코딩 방법)

  • Oh, Hyung-Suk;Kim, Won-Ha
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.223-236
    • /
    • 2012
  • We develop a video processing method that allows the more advanced human perception oriented video coding. The proposed method necessarily reflects all influences by the rate-distortion based optimization and the human visual perception that is affected by the visual saliency, the limited space-time resolution and the regional moving history. For reflecting the human perceptual effects, we devise an online moving pattern classifier using the Hedge algorithm. Then, we embed the existing visual saliency into the proposed moving patterns so as to establish a human visual perception model. In order to realize the proposed human visual perception model, we extend the conventional foveation filtering method. Compared to the conventional foveation filter only smoothing less stimulus video signals, the developed foveation filter can locally smooth and enhance signals according to the human visual perception without causing any artifacts. Due to signal enhancement, the developed foveation filter more efficiently transfers the bandwidth saved at smoothed signals to the enhanced signals. Performance evaluation verifies that the proposed video processing method satisfies the overall video quality, while improving the perceptual quality by 12%~44%.

Understanding Visitor Learning in a Natural History Museum : A Case of Dyadic Discourses

  • Lee, Sun-Kyung;Kim, Chan-Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.27 no.2
    • /
    • pp.134-143
    • /
    • 2007
  • This study explores visitor learning in a natural history museum from the perspectives of situated learning. The purpose of this study is to understand how the visitors construct knowledge from museum experiences through dyadic discourses. The participants were two university students. They moved naturally through the exhibition with no predetermined path in a natural history museum in Korea. Data were collected in the form of audio-recorded dyadic discourses at and between exhibits and were transcribed. The transcription was coded using the conversation coding scheme, and categorized into specific learning types. The findings included (1) the characteristics of learning talks and (2) learning types created by dyadic discourses at and between exhibitions within learning contexts as museum learning experiences. Implications and future research related to visitor learning in informal learning settings were discussed based on the findings.

Fast Mode Decision using Block Size Activity for H.264/AVC (블록 크기 활동도를 이용한 H.264/AVC 부호화 고속 모드 결정)

  • Jung, Bong-Soo;Jeon, Byeung-Woo;Choi, Kwang-Pyo;Oh, Yun-Je
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.1-11
    • /
    • 2007
  • H.264/AVC uses variable block sizes to achieve significant coding gain. It has 7 different coding modes having different motion compensation block sizes in Inter slice, and 2 different intra prediction modes in Intra slice. This fine-tuned new coding feature has achieved far more significant coding gain compared with previous video coding standards. However, extremely high computational complexity is required when rate-distortion optimization (RDO) algorithm is used. This computational complexity is a major problem in implementing real-time H.264/AVC encoder on computationally constrained devices. Therefore, there is a clear need for complexity reduction algorithm of H.264/AVC such as fast mode decision. In this paper, we propose a fast mode decision with early $P8\times8$ mode rejection based on block size activity using large block history map (LBHM). Simulation results show that without any meaningful degradation, the proposed method reduces whole encoding time on average by 53%. Also the hybrid usage of the proposed method and the early SKIP mode decision in H.264/AVC reference model reduces whole encoding time by 63% on average.

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.

HDTV Image Compression Algorithm Using Leak Factor and Human Visual System (누설요소와 인간 시각 시스템을 이용한 HDTV 영상 압축 알고리듬)

  • 김용하;최진수;이광천;하영호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.822-832
    • /
    • 1994
  • DSC-HDTV image compression algorithm removes spatial, temporal, and amplitude redundancies of an image by using transform coding, motion-compensated predictive coding, and adaptive quantization, respectively. In this paper, leak processing method which is used to recover image quality quickly from scene change and transmission error and adaptive quantization using perceptual weighting factor obtained by HVS are proposed. Perceptual weighting factor is calculated by contrast sensitivity, spatio-temporal masking and frequency sensitivity. Adaptive quantization uses the perceptual weighting factor and global distortion level from buffer history state. Redundant bits according to adaptation of HVS are used for the next image coding. In the case of scene change, DFD using motion compensated predictive coding has high value, large bit rate and unstabilized buffer states since reconstructed image has large quantization noise. Thus, leak factor is set to 0 for scene change frame and leak factor to 15/16 for next frame, and global distortion level is calculated by using standard deviation. Experimental results show that image quality of the proposed method is recovered after several frames and then buffer status is stabilized.

  • PDF

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF