scholarly journals Vocabulary Recognition Post-Processing System using Phoneme Similarity Error Correction

2010 ◽  
Vol 15 (7) ◽  
pp. 83-90
Author(s):  
Chan-Shik Ahn ◽  
Sang-Yeob Oh
2004 ◽  
Author(s):  
Yibin Yang ◽  
Lilla Boroczky ◽  
Kees van Zon

2022 ◽  
Author(s):  
Prabhas Kumar Singh ◽  
Biswapati Jana ◽  
Kakali Datta

Abstract In 2020, Ashraf et al. proposed an interval type-2 fuzzy logic based block similarity calculation using color proximity relations of neighboring pixels in a steganographic scheme. Their method works well for detecting similarity, but it has drawbacks in terms of visual quality, imperceptibility, security, and robustness. Using Mamdani fuzzy logic to identify color proximity at the block level, as well as a shared secret key and post-processing system, this paper attempts to develop a robust data hiding scheme with similarity measure to ensure good visual quality, robustness, imperceptibility, and enhance the security. Further, the block color proximity is graded using an interval threshold. Accordingly, data embedding is processed in the sequence generated by the shared secret keys. In order to increase the quality and accuracy of the recovered secret message, the tampering coincidence problem is solved through a post-processing approach. The experimental analysis, steganalysis and comparisons clearly illustrate the effectiveness of the proposed scheme in terms of visual quality, structural similarity, recoverability and robustness.


Author(s):  
Yumin Su ◽  
Zhaoli Wang

A new kind of dish-shaped underwater vehicle was designed. The maneuverability of the dish-shaped underwater vehicle (UV) is predicted in this paper. Hydrodynamic coefficients of the vehicle were calculated in numerically. The numerical method applied is one of the tools available in the commercial computational fluid dynamics software FLUENT. The dynamic mesh system and post-processing system are adopted in the numerical method. By simulating numerically straight motion, inclined motion and planar motion mechanism (PMM) experiment, the hydrodynamic performance in different states were obtained. Based on the least square method, the hydrodynamic coefficients of maneuverability were obtained. The calculated results indicate that the numerical method is suitable.


1982 ◽  
Vol 26 (7) ◽  
pp. 625-628 ◽  
Author(s):  
Alan S. Neal ◽  
William H. Emmons

In order to answer questions related to keying errors and operator corrections, performance data were collected on typists as they keyed text into a simulated word processing system. Data are presented on the frequency of error detection, the amount of time spent correcting errors, the number of characters erased per error correction, and the types of errors corrected. Comparisons are also made between operator corrected and uncorrected errors.


2012 ◽  
Vol 12 (3&4) ◽  
pp. 203-214
Author(s):  
Xiongfeng Ma ◽  
Norbert Lutkenhaus

Security proofs of quantum key distribution (QKD) often require post-processing schemes to simplify the data structure, and hence the security proof. We show a generic method to improve resulting secure key rates by partially reversing the simplifying post-processing for error correction purposes. We apply our method to the security analysis of device-independent QKD schemes and of detection-device-independent QKD schemes, where in both cases one is typically required to assign binary values even to lost signals. In the device-independent case, the loss tolerance threshold is cut down by our method from 92.4% to 90.9%. The lowest tolerable transmittance of the detection-device-independent scheme can be improved from 78.0% to 65.9%


2021 ◽  
Author(s):  
Subhash Kak

<p>This paper considers the entropy perspective on the problem of noise in the circuit where the quantum data is prepared before it is sent forward to the error correction encoder. Since the errors in the circuits before the data qubits are converted to logical qubits cannot be corrected, there will be residual qubit errors in the processing system. This constitutes a great challenge for developing useful, scalable quantum computers. </p>


Author(s):  
J. Li ◽  
Yangpeng Song ◽  
Ye Liu

Although machine control data can be obtained by means of converting cutter location (CL) data comprised of the tool tip coordinate and the tool axis orientation vector in the workpiece coordinate frame with postprocessor, it’s uncertain whether they can be used for 5-axis machining. Owing to the fact that most postprocessors focus on the method to derive solutions for the equations of NC data by the form-shaping function matrix and the inverse kinematics model without taking the manufacturing scene into consideration, this study has presented a new post-processing system to generate and optimize NC data more effectively by correcting and selecting optimum solution intelligently for machining based on the solid model of machine tool in simulation environment. In general, the post-processing system consists of user interface layer, data access layer and data processing layer to give expression to the characteristics of universality, practicality and adaptability. User interface layer is mainly about loading the machine model and setting the relevant parameters. Data access layer includes model library of generalized five-axis machine tool configurations, rules library of cutter location data and NC data. Data processing layer is the major research in the paper, which illustrates how to correct the inverse solutions set and select the optimization solution for actual machining. The visual interface for post-processing system written by C++ was successfully applied in the experiment on a five-axis machine tool with a C-axis behind a B-axis rotary table, which demonstrated the effectiveness of the proposed post-processing methodology in the field of manufacturing.


Sign in / Sign up

Export Citation Format

Share Document