• Title/Summary/Keyword: public speech

Search Result 128, Processing Time 0.032 seconds

Intelligent Digital Public Address System using Agent Based on Network

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.1
    • /
    • pp.87-92
    • /
    • 2013
  • In this paper, we developed a digital and integrated PA(Public Address) system with speech recognition and sensor connection based on IP with an ID using agent. It has facilities such as an external input, a microphone and a radio for a PA system and has speech recognition. If "fire" is spoken to the PA system then it can recognize the emergency situation and will broadcast information to the appropriate agency immediately. In addition to that, many sensors, such as temperature, humidity, and infrared, etc., can be connected to the PA system and can be integrated with the context awareness which contains many types of information about internal statuses using inference agent. Also, developed the digital integrated PA system will make it possible to broadcast the message to adaptable places using network IP based on IDs. Finally, the digital PA system is designed for operation from a PC, which makes installation and setting of operating parameters very simple and user-friendly. For implementation details, we implemented thread based concurrent processing for the events which occur concurrently from many sensors or users.

Word class information in perception of prosodic prominence by Korean learners of English

  • Im, Suyeon
    • Phonetics and Speech Sciences
    • /
    • v.11 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • This study aims to investigate how prosodic prominence is perceived in relation to word class information (or parts-of-speech) by Korean learners of English compared with native English speakers in public speech. Two groups, Korean learners of English and native English speakers, were asked to judge words perceived as prominent simultaneously while listening to a speech. Parts-of-speech and three acoustic cues (i.e., max F0, mean phone duration, and mean intensity) were analyzed for each word in the speech. The results showed that content words tended to be higher in pitch and longer in duration than function words. Both groups of listeners rated prominence on content words more frequently than on function words. This tendency, however, was significantly greater for Korean learners of English than for native English speakers. Among the parts-of-speech of the content words, Korean learners of English were more likely than native English speakers to judge nouns and verbs as prominent. This study presents evidence that Korean learners of English consider most, if not all, content words as landing locations of prosodic prominence, in alignment with the previous study on the production of prominence.

Speech Emotion Recognition Using 2D-CNN with Mel-Frequency Cepstrum Coefficients

  • Eom, Youngsik;Bang, Junseong
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.148-154
    • /
    • 2021
  • With the advent of context-aware computing, many attempts were made to understand emotions. Among these various attempts, Speech Emotion Recognition (SER) is a method of recognizing the speaker's emotions through speech information. The SER is successful in selecting distinctive 'features' and 'classifying' them in an appropriate way. In this paper, the performances of SER using neural network models (e.g., fully connected network (FCN), convolutional neural network (CNN)) with Mel-Frequency Cepstral Coefficients (MFCC) are examined in terms of the accuracy and distribution of emotion recognition. For Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS) dataset, by tuning model parameters, a two-dimensional Convolutional Neural Network (2D-CNN) model with MFCC showed the best performance with an average accuracy of 88.54% for 5 emotions, anger, happiness, calm, fear, and sadness, of men and women. In addition, by examining the distribution of emotion recognition accuracies for neural network models, the 2D-CNN with MFCC can expect an overall accuracy of 75% or more.

A Study on Art's Public Features and Social Intervention by Keith Haring (미술의 공공성과 키스 해링(Keith Haring)의 사회적 개입에 관한 연구)

  • Kim, Jee-Young
    • The Journal of Art Theory & Practice
    • /
    • no.8
    • /
    • pp.59-87
    • /
    • 2009
  • This thesis started from the attempt to make it clear that 80's American artist Keith Haring(1958-1990) had conducted social intervention of criticism, resistance, and participation through his works, and so pursued public value. Haring of graffiti fame left popular and familiar cartoon style pictures on the street wall, the billboards, the posters and so on. Popular and playful works was explained as his unique characteristics, but Haring's creative way at the field has more value than just being grasped as artist's personal characteristics. Haring's work pieces became everyday art by joining with people's life, and are working as a social speaking place. So I think that these Haring's art works possess characteristics of 'the public sphere'. 'The Public Sphere' means that is independent and free from the government or partisan economic forces, so that is not connected with the interested relations, and that is the sphere of rational argumentation without 'disguise' or 'fabrication', and that is the sphere where general public can participate in and is inspected by them. The public sphere between the sphere of public authority such a nation and a market and the private sphere of free individual, it is mutually connected with them and works as the space forming public opinion. Private individuals communicate with this public sphere and perform a role of direct and indirect check, balance, and social criticism way off from power. Openness that should include the voice of not only leading power but also the socially weak such as citizens, women, homosexuals, minority races, and so on, and alienated class, is an index of the public characteristics. The public sphere is not working just with speech and mass media. Many artists as well as Haring open their mouth and act through an art at the center of society, and create another public sphere by an art. I understood that the real participatory and practical characteristics on the Haring's work is a phenomenon and current of a part of the art world including Haring. Such current started from 1960s is the in-depth effort to be connected with the life more closely, to communicate with people, and to improve problems of life. And it has pursued public value on the different way from the nation or public power. Artists have intervened in the society with strategic and positive ways in order to raise pushed-out value and sinked rights as the public agenda, and labored to accept the value of variety and difference at the society. The aspect of such social intervention is the notable features, findable on the Haring's works and process. Haring's works include art historical meanings and are expressed with familiar and plastic language, so they were able to communicate with various classes. And he secured various customers at the field and the street. This communicative and public approach factor raised the possibility much for his works to work as the public sphere. Haring presented critical and resistant speech toward society with his works based on this factor. He asserted his position and justice of gender identity as a sexual minority. And his such work continued to movement for alienated class and social week over his own rights. His speech and message on the wall painting, poster, T-shirts, billboard of the subway, and so on worked as a spectacle and pressed concern with social issues and consciousness shift. And he's been trying to protect and care people who is injured by HIV and drug and to realize social justice through social week protection. Haring's works planned to meet many people as much as possible performed its role of intervening in society through criticism, resistance, speech, and participation, and controlling and checking social issues. These things considered, Haring's works show his consciousness about public attributes of art, and obviously include public value seeking. And also we can find the meaning of such his work as that an art is working as the public sphere and shows the possibility to discuss and practice public issues.

  • PDF

Perceptions of military personnel towards stuttering and persons who stutter: Using the Public Opinion Survey of Human Attributes-Stuttering (POSHA-S) (직업군인의 말더듬에 대한 인식 연구: Public Opinion Survey of Human Attributes-Stuttering(POSHA-S)를 이용하여)

  • Hwajung Cha;Jin Park
    • Phonetics and Speech Sciences
    • /
    • v.16 no.2
    • /
    • pp.71-81
    • /
    • 2024
  • This study investigated the perceptions of military personnel toward stuttering and persons who stutter (PWS) using the Public Opinion Survey of Human Attributes of -Stuttering (POSHA-S). A total of 67 military personnel participated in the study (male: 58, female: 9, commissioned officers: 11, non-commissioned officers: 56, with an average age of 31.9 years and a standard deviation of 8.7), and the collected data were analyzed according to the guidelines provided by St. Louis. To compare the perceptions of military personnel toward stuttering and PWS, percentile ranks (%iles) relative to the global POSHA-S database, which were constructed from responses from a total of 20,941 participants from various cultural regions, countries, and groups (as of June 2023), were retrieved. Results showed that the overall stuttering score for military personnel was 7, corresponding to the 14 percentile in the POSHA-S database. In addition, the sub-score for ' self-reactions to PWS' was -11 (8 percentile in the POSHA-S database). These results revealed that military personnel hold more negative attitudes toward stuttering and PWS, overall. These findings emphasized the importance of addressing the lack of accurate information among military personnel, suggesting a need for educational programs mainly aimed at improving the understanding of stuttering and PWS within the military.

Development of technology to improve information accessibility of information vulnerable class using crawling & clipping

  • Jeong, Seong-Bae;Kim, Kyung-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.99-107
    • /
    • 2018
  • This study started from the public interest purpose to help accessibility for the information acquisition of the vulnerable groups due to visual difficulties such as the elderly and the visually impaired. In this study, the server resources are minimized and implemented in most of the user smart phones. In addition, we implement a method to gather necessary information by collecting only pattern information by utilizing crawl & clipping without having to visit the site of the information of the various sites having the data necessary for the user, and to have it in the server. Especially, we applied the TTS(Text-To-Speech) service composed of smart phone apps and tried to develop a unified customized information collection service based on voice-based information collection method.

A Study on User Authentication for Wireless Communication Security in the Telematics Environment (텔레메틱스 환경에서 무선통신 보안을 위한 사용자 인증에 관한 연구)

  • Kim, Hyoung-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.104-109
    • /
    • 2010
  • In this paper, we propose a user authentication technology to protect wiretapping and attacking from others in the telematics environment, which users in vehicle can use internet service in local area network via mobile device. In the proposed user authentication technology, the packet speech data is encrypted by speech-based biometric key, which is generated from the user's speech signal. Thereafter, the encrypted data packet is submitted to the information communication server(ICS). At the ICS, the speech feature of the user is reconstructed from the encrypted data packet and is compared with the preregistered speech-based biometric key for user authentication. Based on implementation of our proposed communication method, we confirm that our proposed method is secure from various attack methods.

Comparative Analysis of Speech Recognition Open API Error Rate

  • Kim, Juyoung;Yun, Dai Yeol;Kwon, Oh Seok;Moon, Seok-Jae;Hwang, Chi-gon
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.79-85
    • /
    • 2021
  • Speech recognition technology refers to a technology in which a computer interprets the speech language spoken by a person and converts the contents into text data. This technology has recently been combined with artificial intelligence and has been used in various fields such as smartphones, set-top boxes, and smart TVs. Examples include Google Assistant, Google Home, Samsung's Bixby, Apple's Siri and SK's NUGU. Google and Daum Kakao offer free open APIs for speech recognition technologies. This paper selects three APIs that are free to use by ordinary users, and compares each recognition rate according to the three types. First, the recognition rate of "numbers" and secondly, the recognition rate of "Ga Na Da Hangul" are conducted, and finally, the experiment is conducted with the complete sentence that the author uses the most. All experiments use real voice as input through a computer microphone. Through the three experiments and results, we hope that the general public will be able to identify differences in recognition rates according to the applications currently available, helping to select APIs suitable for specific application purposes.

Crossing the "Great Fire Wall": A Study with Grounded Theory Examining How China Uses Twitter as a New Battlefield for Public Diplomacy

  • Guo, Jing
    • Journal of Public Diplomacy
    • /
    • v.1 no.2
    • /
    • pp.49-74
    • /
    • 2021
  • In this paper, I applied grounded theory in exploring how Twitter became the battlefield for China's public diplomacy campaign. China's new move to global social media platforms, such as Twitter and Facebook, has been a controversial strategy in public diplomacy. This study analyzes Chinese Foreign Spokesperson Zhao Lijian's Twitter posts and comments. It models China's recent diplomatic move to Twitter as a "war of words" model, with features including "leadership," "polarization," and "aggression," while exerting possible effects as "resistance," "hatred," and "sarcasm" to the global community. Our findings show that by failing to gage public opinion and promote the country's positive image, China's current digital diplomacy strategy reflected by Zhao Lijian's tweets has instead constructed a polarized political public sphere, contradictory to the country's promoted "shared human destiny." The "war of words" model extends our understanding of China's new digital diplomacy move as a hybrid of state propaganda and self-performance. Such a strategy could spread hate speech and accelerate political polarization in cyberspace, despite improvements to China's homogenous network building on Twitter.

End-to-End Digital Secure Speech Communication over UHF and PSTN (UHF와 PSTN간 단대단 디지털 음성보안통신)

  • Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.5
    • /
    • pp.2313-2318
    • /
    • 2012
  • With the widely applications of tactical radio networks, end-to-end secure speech communication in the heterogeneous network has become a very significant security issue. High-grade end-to-end speech security can be achieved using encryption algorithms at user ends. However, the use of encryption techniques results in a problem that encrypted speech data cannot be directly transmitted over heterogeneous tactical networks. That is, the decryption and re-encryption process must be fulfilled at the gateway between two different networks. In this paper, in order to solve this problem and to achieve optimal end-to-end speech security for heterogeneous tactical environments, we propose a novel mechanism for end-to-end secure speech transmission over ultra high frequency (UHF) and public switched telephone network (PSTN) and evaluate against the performance of conventional mechanism. Our proposed mechanism has advantages of no decryption and re-encryption at the gateway, no processing delay at the gateway, and good inter-operability over UHF and PSTN.