• Title/Summary/Keyword: text configuration

Search Result 41, Processing Time 0.027 seconds

Text to Speech System from Web Images (웹상의 영상 내의 문자 인식과 음성 전환 시스템)

  • 안희임;정기철
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.5-8
    • /
    • 2001
  • The computer programs based upon graphic user interface(GUI) became commonplace with the advance of computer technology. Nevertheless, programs for the visually-handicapped have still remained at the level of TTS(text to speech) programs and this prevents many visually-handicapped from enjoying the pleasure and convenience of the information age. This paper is, paying attention to the importance of character recognition in images, about the configuration of the system that converts text in the image selected by a user to the speech by extracting the character part, and carrying out character recognition.

  • PDF

Guiding Practical Text Classification Framework to Optimal State in Multiple Domains

  • Choi, Sung-Pil;Myaeng, Sung-Hyon;Cho, Hyun-Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.285-307
    • /
    • 2009
  • This paper introduces DICE, a Domain-Independent text Classification Engine. DICE is robust, efficient, and domain-independent in terms of software and architecture. Each module of the system is clearly modularized and encapsulated for extensibility. The clear modular architecture allows for simple and continuous verification and facilitates changes in multiple cycles, even after its major development period is complete. Those who want to make use of DICE can easily implement their ideas on this test bed and optimize it for a particular domain by simply adjusting the configuration file. Unlike other publically available tool kits or development environments targeted at general purpose classification models, DICE specializes in text classification with a number of useful functions specific to it. This paper focuses on the ways to locate the optimal states of a practical text classification framework by using various adaptation methods provided by the system such as feature selection, lemmatization, and classification models.

A Comparative Study of Tight Skirt Sewing Methods -Focusing on the Sewing Methods Shown in Reference Text Books on Clothing Configuration and used in Domestic Consumer Products- (타이트스커트 봉제방법에 관한 비교 연구 -의복구성 교재와 국내 브랜드 제품을 중심으로-)

  • Kim, Sun-Young;Choi, Young-Soon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.11
    • /
    • pp.1510-1519
    • /
    • 2007
  • This comparative study analyzes and compares tight skirt sewing methods which are found in the clothing configuration reference text books available in contemporary universities and which are used in commercially-available domestic consumer products. The study samples included 15 text books and 12 tight skirt consumer products of different brands on sale at three department stores in Seoul each of which had a belt, a back-centered zipper, and back double slits. The findings of the study are summarized as follows: First, text books mainly show very basic sewing methods of using zippers on both sides of the straight-lined waist belt. This indicates that it is necessary for such methods to be complemented so that they cover a recent variety of designs, materials, and sewing machines. For consumer products, the main sewing method is to use a curved waist belt and a console zipper in silhouette running across half the hipbone. Second, consumer products employ three different types of cutting and sewing methods for putting an inseam on the center of the back slit part: to leave the whole inseam hemmed in the back center, to cut the left side of the inseam to the upper part of the back slit, and to cut the inseam to both the upper parts of the back slit. However, a method shown in most of the sampled text books is to cut the inseam of the back center to both the upper parts of the back slit. Third, the way of finishing a bottom edge hem in the text books is to do slip-stitch, herringbone stitch, and slinting hemming, in order after doing over-lock stitch, or to cut the hem on the bias and then slip-stitch, while for the consumer products the most frequently used sewing method is to finish the bottom edge hem by doing secoui-stitch. Finally, while in the text books the method of stitching darts and tucks is used for lining, the main lining method used in consumer products is to make tucks only. Also in the way of stitching the side seams of lining or the seams of the back center, there is a difference between the two sample groups of text books and the consumer products: while the former suggests using both open seams and over-lock stitch, the latter is found to finish the seams using an over-lock stitch only.

A Study on the way of annotation in 『Sok-Mong-Gu Bun-Ju』(續蒙求分註) (『속몽구분주(續蒙求分註)』의 분주(分註) 방식 시고(試考))

  • Lee, Yeon-Soon
    • (The)Study of the Eastern Classic
    • /
    • no.48
    • /
    • pp.147-167
    • /
    • 2012
  • This paper was investigated by comparing "Sok-Mong-Gu Bun-Ju"(續蒙求分註) and "Mong-Gu"(蒙求). As a result, "Mong-Gu" was organized around the person anecdotes, "Sok-Mong-Gu Bun-Ju" is annotated with the person anecdotes. So the text show an differences were found on the configuration. Thus It reveal that "Sok-Mong-Gu Bun-Ju" is a tome and convenient to use the report has been made by scholars can be clarified.

HTML Text Extraction Using Tag Path and Text Appearance Frequency (태그 경로 및 텍스트 출현 빈도를 이용한 HTML 본문 추출)

  • Kim, Jin-Hwan;Kim, Eun-Gyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1709-1715
    • /
    • 2021
  • In order to accurately extract the necessary text from the web page, the method of specifying the tag and style attributes where the main contents exist to the web crawler has a problem in that the logic for extracting the main contents. This method needs to be modified whenever the web page configuration is changed. In order to solve this problem, the method of extracting the text by analyzing the frequency of appearance of the text proposed in the previous study had a limitation in that the performance deviation was large depending on the collection channel of the web page. Therefore, in this paper, we proposed a method of extracting texts with high accuracy from various collection channels by analyzing not only the frequency of appearance of text but also parent tag paths of text nodes extracted from the DOM tree of web pages.

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

Three Dimensional Networked Virtual Reailty Architecture Enabling Flexible Configuration Based on Function Distribution

  • Yasuyuki-KIYOSUE;Shohei-SUGAWARA;Shigeki-MASAKI;Susumu-ICHINOSE
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1999.06a
    • /
    • pp.23.1-28
    • /
    • 1999
  • InterSpaceTM is an advanced networked virtual reality system that presents shared three-dimensional computer graphics (CG) worlds via the Internet where multiple users can enjoy synchronous communications with voice, video and text. Users can control their avatars as a surrogate interface. In InterSpace users can walk around and interact with other people and interact with contents. In this paper, we describe the function-distributed architecture used in InterSpace. The architecture enables flexible configuration of server functions and load distribution. It also allows users to select media and client PCs to switch servers dynamically.

A Genetic Algorithm Approach to the Frequency Assignment Problem on VHF Network of SPIDER System

  • Kwon, O-Jeong
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.56-69
    • /
    • 2000
  • A frequency assignment problem on time division duplex system is considered. Republic of Korea Army (ROKA) has been establishing an infrastructure of tactical communication (SPIDER) system for next generation and it will be a core network structure of system. VHF system is the backbone network of SPIDER, that performs transmission of data such as voice, text and images. So, it is a significant problem finding the frequency assignment with no interference under very restricted resource environment. With a given arbitrary configuration of communications network, we find a feasible solution that guarantees communication without interference between sites and relay stations. We formulate a frequency assignment problem as an Integer Programming model, which has NP-hard complexity. To find the assignment results within a reasonable time, we take a genetic algorithm approach which represents the solution structure with available frequency order, and develop a genetic operation strategies. Computational result shows that the network configuration of SPIDER can be solved efficiently within a very short time.

  • PDF

A Study on the Design of CTI/VoIP Based Internet Call Systems (CTI/VoIP 기반 인터넷 콜시스템의 설계에 관한 연구)

  • Lee, Kang-Seok;Yum, Chang-Sun;Hwang, Gee-Hyun
    • IE interfaces
    • /
    • v.15 no.4
    • /
    • pp.391-400
    • /
    • 2002
  • The internet call systems using CTI(Computer Telephony Integration) functions are designed with system configuration, DFD(Data Flow Diagram) and ERD(Entity Relationship Diagram) in this paper. The internet call systems are constructed to cooperate with conventional CTI call center. The internet phone calls occurred from the web browser of customer can be connected throughout VoIP gateway and PBX to many counselors. The internet call systems can provide various services; customer information service, escorted browsing service, text chatting service, text sharing service, conference service, and statistical analysis service.