• Title/Summary/Keyword: verification ways

Search Result 165, Processing Time 0.024 seconds

An Implementation of Speaker Verification System Based on Continuants and Multilayer Perceptrons

  • Lee, Tae-Seung;Park, Sung-Won;Lim, Sang-Seok;Hwang, Byong-Won
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.216-219
    • /
    • 2003
  • Among the techniques to protect private information by adopting biometrics, speaker verification is expected to be widely used due to advantages in convenient usage and inexpensive implementation cost Speaker verification should achieve a high degree of the reliability in the verification nout the flexibility in speech text usage, and the efficiency in verification system complexity. Continuants have excellent speaker-discriminant power and the modest number of phonemes in the category, and multilayer perceptrons (MLPs) have superior recognition ability and fast operation speed. In consequence, the two provide viable ways for speaker verification system to obtain the above properties. This paper implements a system to which continuants and MLPs are applied, and evaluates the system using a Korean speech database. The results of the experiment prove that continuants and MLPs enable the system to acquire the three properties.

  • PDF

Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage

  • Xu, Guangwei;Sun, Zhifeng;Yan, Cairong;Shi, Xiujin;Li, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.1-17
    • /
    • 2017
  • Mobile Cloud Computing has become a promising computing platform. It moves users' data to the centralized large data centers for users' mobile devices to conveniently access. Since the data storage service may not be fully trusted, many public verification algorithms are proposed to check the data integrity. However, these algorithms hardly consider the huge computational burden for the verifiers with resource-constrained mobile devices to execute the verification tasks. We propose an energy-efficient algorithm for assigning verification tasks (EEAVT) to optimize the energy consumption and assign the verification tasks by elastic and customizable ways. The algorithm prioritizes verification tasks according to the expected finish time of the verification, and assigns the number of checked blocks referring to devices' residual energy and available operation time. Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability of the verification.

Roles of Social Identity Verification in the Effects of Symbolic and Evaluation Relevance on Chinese Consumers' Brand Attitude

  • Choi, Nak-Hwan;Xu, Huimin;Teng, Zhuoqi
    • Asian Journal of Business Environment
    • /
    • v.8 no.4
    • /
    • pp.17-27
    • /
    • 2018
  • Purpose - Current study aimed at investigating the symbolic and evaluation relevance to global luxury brands as the causes of inducing social identity verification, and also explored whether the social identity verification will affect the attitude toward the brands. Research design, data, and methodology - 323 questionaries from Chinese consumers were used to test hypotheses by structural equation model of AMOS 22.0. Results - First, social identity verification positively affected on the brand attitude. Second, both the symbolic relevance and the evaluation relevance positively affected on social identity verification. Third, the mediation roles of social identity verification were identified. Social identity verification played a full mediation role in the effect of the symbolic relevance on the brand attitude, and played a partial mediation role in the effect of the evaluation relevance on the brand attitude. Conclusions - This study could contribute to the advancement of theory concerned with the roles of consumers' social identity verification which induces positive attitude toward the global luxury brands. Global brand managers in China should try to search ways by which consumers can feel both the symbolic relevance and evaluation relevance to their luxury brands, and should make efforts to improve the symbolic relevance and evaluation relevance to their brand.

A direction of warfighting experiments for a scientific combat Development (과학적 전투발전을 위한 전투실험 발전 방향)

  • Chung, Choon-Il;Lee, Myeong-Woo
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.351-392
    • /
    • 2007
  • Combat Development is process of studying and developing concept, doctrine, weapon systems, organization and training for the improvement of combat capability to be ready present and future warfare. The combat development domain consists of 6 fields Doctrine, Organization, Material, Training, Personnel, and Facilities. The cornerstones of combat development are "How to prepare" and "How to fight" in the future warfare. ROK- TRADOC(Republic of Korea Army Training and Doctrine Command) has implemented combat development that applies CBRS (Concept-Based Requirements System) and "Vision - Capstone concept - operating and functional concept - FOC(Future Operational Capabilities) Requirements". To prepare for the possibility or new types or wars in the future, the creation of new concept and system is essential. Though verification with various instruments, combat power can be secured and exhibited. Combat development by empirical mind estimation means that is no longer relevant.To prepare combat development based on scientific analysis, there is a need for powerful engineering analysis and verification, in order to prepare for uncertain and diverse future battlefield environments. In this thesis, warfighting experiment is essential ways and means to pursue the scientific combat development ; investigated tendency of combat development environment, and analyzed diversification aspects of possible future warfare. In conclusion, concept of campaign experiment and role is the conerstone of scientific combat development; and lays out the roadmap of all affecting components to its development.

  • PDF

Speaker Verification System Using Support Vector Machine with Genetic Algorithms (유전자 알고리즘을 결합한 Support Vector Machine의 화자인증에서의 성능분석)

  • 최우용;이경희;반성범
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.557-560
    • /
    • 2003
  • Voice is one of the promising biometrics because it is one of the most convenient ways human would distinguish someone from others. The target of speaker verification is to divide the client from imposters. Support Vector Machine(SVM) is in the limelight as a binary classifier, so it can work well in speaker verification. In this paper, we combined SVM with genetic algorithm(GA) to reduce the dimensionality of input feature. Experiments were conducted with Korean connected digit database using different feature dimensions. The verification accuracy of SVM with GA is slightly lower than that of SVM, but the proposed algorithm has greater strength in the memory limited systems.

  • PDF

An Efficient Signature Batch Verification System for VANET (VANET를 위한 효율적인 서명 일괄 확인 시스템)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.17-31
    • /
    • 2010
  • In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures efficiently using batch verification techniques. However, batch verification performed independently in each vehicle raises many redundant verification cost. Although, an RSU (Road Side Unit) can perform the batch verification as a proxy to reduce this cost, it additionally requires an efficient method to identify invalid signatures when the batch verification fails. In this paper, we analyze several ways of constructing a distributed batch verification system, and propose an efficient distributed batch verification system in which participating vehicles perform batch verification in a distributive manner for a small size signature set. In our proposed system, each node can report the batch verification result or the identified invalid signatures list and the RSU who received these reports can identify the invalid signatures and efficiently exclude them.

Development of Verification System and Selection Process for Track Structure (궤도구조 성능검증체계 및 선정프로세스 구축)

  • Lee, Ho-Ryong;Jang, Seung-Yup;Kim, Yeon-Guk;Yun, Sung-Soon
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.292-298
    • /
    • 2010
  • Recently, with the beginning of the commercial operation of high-speed railway, there have been a number of changes in track structure fields. Also, it is expected that the development and introduction of new technology will be increased afterwards. However, it accompanies a lot of risk to install new track structures of which performance and safety are not verified on permanent ways with high traffic density. Therefore, to minimize the risk and enhance the adoption of new technology, it is required to develop a systemic verification system for track structure. To do this, in this paper, main contents of a draft of guidelines for track structure verification, and main issues in debate such as criteria and method for verification, test conditions and test periods are discussed. Also, a process to choose a most appropriate one for a specific project out of proven track structures by the above verification system, the selection process by the technical investigation committee and the VE process to analyze the economical and maintenance aspects based on LCC concept in Korea Rail Network Authority is introduced.

  • PDF

Laboratory Test Method for the Forward Motion Compensation of Airborne Camera (항공용 카메라 전방운동 보상기능의 실험실 입증방안)

  • Song, Dae-Buem;Yoon, Yong-Eun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.4
    • /
    • pp.507-512
    • /
    • 2012
  • Image blurring in airborne camera can be prevented through timely actuation of LOS(Line of Sight) into the opposite direction to the aircraft advancement, i.e. FMC(Forward motion compensation). Performance verification of FMC requires installation of camera to the aircraft. However, in many ways the verification process has little choice but to be implemented in the laboratory. In this paper verification method of FMC performance in the laboratory is introduced. With collimator target installed in the known reference position image obtained by actual mission plan naturally displays image blurring as well as LOS displacement by FMC effect. Through comparison of the amount of those image blurring and LOS displacement to the equivalent image distortion expected by the application of the FMC reference command can the performance be verified. In this paper we propose a new verification method of FMC performance in laboratory along with generalized solution of FMC reference command, and assess the validity of our proposition.

Speaker Verification System Using Continuants and Multilayer Perceptrons (지속음 및 다층신경망을 이용한 화자증명 시스템)

  • Lee, Tae-Seung;Park, Sung-Won;Hwang, Byong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.1015-1020
    • /
    • 2003
  • Among the techniques to protect private information by adopting biometrics, speaker verification is expected to be widely used due to advantages in convenient usage and implementation cost. Speaker verification should achieve a high degree of the reliability in the verification score, the flexibility in speech text usage, and the efficiency in verification system complexity. Continuants have excellent speaker-discriminant power and the modest number of phonemes in the category, and multilayer perceptrons (MLPs) have superior recognition ability and fast operation speed. In consequence, the two provide viable ways for speaker verification system to obtain the above properties. This paper implements a system to which continuants and MLPs are applied, and evaluates the system using a Korean speech database. The results of the experiment prove that continuants and MLPs enable the system to acquire the three properties.

  • PDF

Technology Review on Multimodal Biometric Authentication (다중 생체인식 기반의 인증기술과 과제)

  • Cho, Byungchul;Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.132-141
    • /
    • 2015
  • There might have been weakness in securing user authentication or verification with real time service approach, while existing unimodal biometric authentication has been used mainly for user identification and recognition. Accordingly, it is essential to research and develop ways that upgrade security performance with multi biometric based real time authentication and verification technology. This paper focused to suggest binding assignment and strategy for developing multi biometric authentication technology through investigation of advanced study and patents. Description includes introduction, technology outline, technology trend, patent analysis, and conclusion.