Multi-layered stratification can effectively meet the diverse needs of users. This design proposes a solution for providing information services in different administrative regions using a multi-layered stratification...
详细信息
Aiming at the disadvantage of static word vector model to the problem of polysemy of words, a model based on dynamic word vector and two-way GRU neural network combined with attention mechanism is proposed to recogniz...
详细信息
With the development of electronic technology, the study of signal distortion is particularly important. For example, if harmonic distortion is produced, it will make the multimedia audio lose its original timbre and ...
详细信息
In this paper, a principal component analysis (PCA) based algorithm is proposed, which combines with improved Cuckoo Search (ICS) and Support Vector Machine (SVM). Firstly, PCA is used to reduce the dimension of the e...
详细信息
Recent researches have proven that deep denoising autoencoder is an effective method for noise reduction and speech enhancement, and can provide better performance than several existing methods. However, training deep...
详细信息
Influenced by Lombard effect, the synthetic noisy speech training data commonly used in speech enhancement algorithm based on deep learning is different from the pronunciation under actual noise, which leads to the li...
详细信息
Today, the increasingly complex external environment and the goal of building a harmonious society have put forward higher requirements for security check work. Traditional security inspection methods are facing enorm...
详细信息
A large quantity of statistics is generated each day using DevOps techniques from many sources;inclusive of sensors, internet site utilization, gadget activities, and so on. This sparkling waft of activities have to b...
详细信息
The book management system pays more attention to light weight. Managers only need to perform simple operations to complete the operation of adding, deleting, modifying, and checking book categories and the operations...
详细信息
In recent years, the world has witnessed a great increase in IoT Botnet attacks. Since these IoT devices are heterogeneous and typically resource-constrained with less processing and memory resources available to empl...
详细信息
暂无评论