This paper described a new speech emotion recognition system by use of Hidden Markov Model (HMM) aiming at improving speech emotion recognition rate. Seven discrete emotional states (anger, disgust, fear, joy, neutral...
详细信息
In order to determine if a given mooring system is globally asymptotically stable, the mooring system is analyzed based on the hybrid system theory. The stability of linear complementarity system is investigated by us...
详细信息
In this paper studying open vehicle routing problem, a taboo search algorithm for the open vehicle routing problem with hard time windows is proposed. After constructing a mathematical model for the problem, this pape...
详细信息
With constant development of multimedia technology, large amount of image information is given more and more attention by people. High-quality image compression becomes the hot subject of current study. In this paper,...
详细信息
Independence and control is the trend of the our army C4ISR future development .The paper introduced the definition of the C4ISR architecture , analysis the conception about the freedom and controlled and importance t...
详细信息
The Blob saving ways in SQL Server and disk saving theory of files in operation systems is analyzed in this paper. A method of splitting files in the Blob saving is given, which has been proved to be available to impr...
详细信息
Fault diagnosis for hydraulic components has features of nonlinearity and high dimensional pattern identification, so it's difficult to do it accurately with small sample using some common methods. Aimed at this p...
详细信息
An adaptive variable-rate inter-satellite communication method based on SOC and RFIC was proposed, where different communication rates were selected for variable inter-satellite distance. Our method alerted the length...
详细信息
This paper proposes a new SynFlood attack target location method based on the Abnormal TCP Connection Graph (ATCG). The method build an Abnormal TCP Connection Graph based on the status of TCP connections. Then the me...
详细信息
Basic block in program analysis plays an important role and it be applied to wide range, such as program compilation, program optimization, reverse engineering, program correctness verification, software security anal...
详细信息
暂无评论