• 제목/요약/키워드: text configuration

검색결과 42건 처리시간 0.026초

웹상의 영상 내의 문자 인식과 음성 전환 시스템 (Text to Speech System from Web Images)

  • 안희임;정기철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(3)
    • /
    • pp.5-8
    • /
    • 2001
  • The computer programs based upon graphic user interface(GUI) became commonplace with the advance of computer technology. Nevertheless, programs for the visually-handicapped have still remained at the level of TTS(text to speech) programs and this prevents many visually-handicapped from enjoying the pleasure and convenience of the information age. This paper is, paying attention to the importance of character recognition in images, about the configuration of the system that converts text in the image selected by a user to the speech by extracting the character part, and carrying out character recognition.

  • PDF

Guiding Practical Text Classification Framework to Optimal State in Multiple Domains

  • Choi, Sung-Pil;Myaeng, Sung-Hyon;Cho, Hyun-Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권3호
    • /
    • pp.285-307
    • /
    • 2009
  • This paper introduces DICE, a Domain-Independent text Classification Engine. DICE is robust, efficient, and domain-independent in terms of software and architecture. Each module of the system is clearly modularized and encapsulated for extensibility. The clear modular architecture allows for simple and continuous verification and facilitates changes in multiple cycles, even after its major development period is complete. Those who want to make use of DICE can easily implement their ideas on this test bed and optimize it for a particular domain by simply adjusting the configuration file. Unlike other publically available tool kits or development environments targeted at general purpose classification models, DICE specializes in text classification with a number of useful functions specific to it. This paper focuses on the ways to locate the optimal states of a practical text classification framework by using various adaptation methods provided by the system such as feature selection, lemmatization, and classification models.

타이트스커트 봉제방법에 관한 비교 연구 -의복구성 교재와 국내 브랜드 제품을 중심으로- (A Comparative Study of Tight Skirt Sewing Methods -Focusing on the Sewing Methods Shown in Reference Text Books on Clothing Configuration and used in Domestic Consumer Products-)

  • 김선영;최영순
    • 한국의류학회지
    • /
    • 제31권11호
    • /
    • pp.1510-1519
    • /
    • 2007
  • This comparative study analyzes and compares tight skirt sewing methods which are found in the clothing configuration reference text books available in contemporary universities and which are used in commercially-available domestic consumer products. The study samples included 15 text books and 12 tight skirt consumer products of different brands on sale at three department stores in Seoul each of which had a belt, a back-centered zipper, and back double slits. The findings of the study are summarized as follows: First, text books mainly show very basic sewing methods of using zippers on both sides of the straight-lined waist belt. This indicates that it is necessary for such methods to be complemented so that they cover a recent variety of designs, materials, and sewing machines. For consumer products, the main sewing method is to use a curved waist belt and a console zipper in silhouette running across half the hipbone. Second, consumer products employ three different types of cutting and sewing methods for putting an inseam on the center of the back slit part: to leave the whole inseam hemmed in the back center, to cut the left side of the inseam to the upper part of the back slit, and to cut the inseam to both the upper parts of the back slit. However, a method shown in most of the sampled text books is to cut the inseam of the back center to both the upper parts of the back slit. Third, the way of finishing a bottom edge hem in the text books is to do slip-stitch, herringbone stitch, and slinting hemming, in order after doing over-lock stitch, or to cut the hem on the bias and then slip-stitch, while for the consumer products the most frequently used sewing method is to finish the bottom edge hem by doing secoui-stitch. Finally, while in the text books the method of stitching darts and tucks is used for lining, the main lining method used in consumer products is to make tucks only. Also in the way of stitching the side seams of lining or the seams of the back center, there is a difference between the two sample groups of text books and the consumer products: while the former suggests using both open seams and over-lock stitch, the latter is found to finish the seams using an over-lock stitch only.

『속몽구분주(續蒙求分註)』의 분주(分註) 방식 시고(試考) (A Study on the way of annotation in 『Sok-Mong-Gu Bun-Ju』(續蒙求分註))

  • 이연순
    • 동양고전연구
    • /
    • 제48호
    • /
    • pp.147-167
    • /
    • 2012
  • 본고는 미암 유희춘이 유배지에서 저술한 "속몽구분주(續蒙求分註)"에 대해 "몽구(蒙求)"와 차이를 가지는 분주(分註) 방식을 시험적으로 고찰하여 그 학술서로서 성격을 규명하고자 하였다. 이에 먼저 "속몽구분주"와 "몽구"의 본문 구성에 차이가 있는 점을 들어, "몽구"가 각 편마다 인용출처를 제시하고 인물 일화 중심으로 본문을 구성하였다면, "속몽구분주"는 인용출처를 맨 앞에 한꺼번에 제시하고 본문에서 일화 소개와 함께 분주의 방식을 취하였음을 밝혔다. 이어서 "속몽구분주"의 분주 방식을 자세히 살펴, "속몽구분주"가 네 가지의 분주법(分註法), 곧 소유이궁원(?流而窮源), 분원이지류(汾源而至流), 누사이일의(累事而一意), 이동이호발(異同而互發)에 따라 분주한 방식에 대해 각기 해당하는 예를 들며 살펴보았다. 이로써 "속몽구분주"가 경사자집(經史子集)의 여러 서책을 출처로 하였으되, 특히 주자의 평과 그 당대 학맥에 속하는 인물들의 언급을 많이 참고하였음을 확인할 수 있었다. 그리하여 "속몽구분주"가 주자학에 철저한 학술서이자 유서(類書)로서 학자들이 이용하기에 편리하게 이루어진 저술임을 밝혔다.

태그 경로 및 텍스트 출현 빈도를 이용한 HTML 본문 추출 (HTML Text Extraction Using Tag Path and Text Appearance Frequency)

  • 김진환;김은경
    • 한국정보통신학회논문지
    • /
    • 제25권12호
    • /
    • pp.1709-1715
    • /
    • 2021
  • 웹 페이지에서 필요한 텍스트를 정확하게 추출하기 위해 본문이 존재하는 곳의 태그와 스타일 속성을 웹 크롤러에 명시하는 방법은 웹 페이지 구성이 변경될 때마다 본문을 추출하는 로직을 수정해야 하는 문제가 있다. 이러한 문제점을 해결하기 위해 이전 연구에서 제안한 텍스트의 출현 빈도를 분석하여 본문을 추출하는 방법은 웹 페이지의 수집 채널에 따라 성능 편차가 크다는 한계점이 있었다. 따라서 본 논문에서는 텍스트의 출현 빈도뿐만 아니라 웹 페이지의 DOM 트리로부터 추출된 텍스트 노드의 부모 태그 경로를 분석하여 다양한 수집 채널에서 높은 정확도로 본문을 추출하는 방법을 제안하였다.

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • 제8권2호
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

Three Dimensional Networked Virtual Reailty Architecture Enabling Flexible Configuration Based on Function Distribution

  • Yasuyuki-KIYOSUE;Shohei-SUGAWARA;Shigeki-MASAKI;Susumu-ICHINOSE
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1999년도 KOBA 방송기술 워크샵 KOBA Broadcasting Technology Workshop
    • /
    • pp.23.1-28
    • /
    • 1999
  • InterSpaceTM is an advanced networked virtual reality system that presents shared three-dimensional computer graphics (CG) worlds via the Internet where multiple users can enjoy synchronous communications with voice, video and text. Users can control their avatars as a surrogate interface. In InterSpace users can walk around and interact with other people and interact with contents. In this paper, we describe the function-distributed architecture used in InterSpace. The architecture enables flexible configuration of server functions and load distribution. It also allows users to select media and client PCs to switch servers dynamically.

A Genetic Algorithm Approach to the Frequency Assignment Problem on VHF Network of SPIDER System

  • Kwon, O-Jeong
    • 한국국방경영분석학회지
    • /
    • 제26권1호
    • /
    • pp.56-69
    • /
    • 2000
  • A frequency assignment problem on time division duplex system is considered. Republic of Korea Army (ROKA) has been establishing an infrastructure of tactical communication (SPIDER) system for next generation and it will be a core network structure of system. VHF system is the backbone network of SPIDER, that performs transmission of data such as voice, text and images. So, it is a significant problem finding the frequency assignment with no interference under very restricted resource environment. With a given arbitrary configuration of communications network, we find a feasible solution that guarantees communication without interference between sites and relay stations. We formulate a frequency assignment problem as an Integer Programming model, which has NP-hard complexity. To find the assignment results within a reasonable time, we take a genetic algorithm approach which represents the solution structure with available frequency order, and develop a genetic operation strategies. Computational result shows that the network configuration of SPIDER can be solved efficiently within a very short time.

  • PDF

CTI/VoIP 기반 인터넷 콜시스템의 설계에 관한 연구 (A Study on the Design of CTI/VoIP Based Internet Call Systems)

  • 이강석;염창선;황기현
    • 산업공학
    • /
    • 제15권4호
    • /
    • pp.391-400
    • /
    • 2002
  • The internet call systems using CTI(Computer Telephony Integration) functions are designed with system configuration, DFD(Data Flow Diagram) and ERD(Entity Relationship Diagram) in this paper. The internet call systems are constructed to cooperate with conventional CTI call center. The internet phone calls occurred from the web browser of customer can be connected throughout VoIP gateway and PBX to many counselors. The internet call systems can provide various services; customer information service, escorted browsing service, text chatting service, text sharing service, conference service, and statistical analysis service.