Speaker age recognition is an essential technique in automation speech recognition based on the speech wavform parameters in speaker39;s ***,there are several challenges in speaker age recognition,such as innate dif...
详细信息
Speaker age recognition is an essential technique in automation speech recognition based on the speech wavform parameters in speaker's ***,there are several challenges in speaker age recognition,such as innate differences in speaker's voice,subjective classification fuzzy,*** issue of speaker age based on isolated words is proposed in this paper,including support vector machine(SVM),picking up Mel frequency cepstrum coefficient(MFCC) characteristics of isolated words to distinguish the speaker's *** voicebox of this paper includes 4507 isolated word *** results show that the recognition rate based on isolated word speech can reach 72.93%.Through the experiment towards SVM classifier,we could find that the performance is improved without normalization for MFCC.
Big data has been widely used in urban planning and architecture in recent years. However, data collecting techniques limit its broader use. As a result, a lot of work has been done to precisely identify and address u...
详细信息
ISBN:
(数字)9798331506582
ISBN:
(纸本)9798331506599
Big data has been widely used in urban planning and architecture in recent years. However, data collecting techniques limit its broader use. As a result, a lot of work has been done to precisely identify and address urban problems through the mining of legally accessible open-source internet data, which has progressively gained popularity among urban scholars. In light of this, using Nanjing as an example, this study uses the Gaode OPEN API to build urban real-time traffic circles and assess the layout of firefighting facilities. In order to extract the average vehicle speed of all roads within a certain time frame and to automatically collect real-time traffic data in the study region, a batch processing model is first developed based on the Gaode OPEN API. It was discovered that the speed causes Nanjing City to be divided into multiple different zones. After that, a case study is carried out to build an urban real-time traffic circle based on the current firefighting facilities using the Python programming language and Arcgis software. After further analysis, it is found that the current planning for firefighting facilities exhibits a notable regional difference between the urban centre and the suburbs. Traffic speed, station density, and road network density all influence the service coverage area of fire stations. This study offers a comprehensive approach for gathering and analysing Gaode data, mining its spatiotemporal properties, and using it in planning evaluation procedures. This strategy highlights the benefits of streaming data features and distributed big data processing, efficiently uses the real-time nature of big data in emergency facility planning, and is expected to expand ideas for data collection.
IoT devices have changed into one of the mainstays in areas like houses, industry and education, resulting in a level of convenience and efficiency that has never been achieved before. Even though the most important a...
详细信息
ISBN:
(数字)9798350375190
ISBN:
(纸本)9798350375206
IoT devices have changed into one of the mainstays in areas like houses, industry and education, resulting in a level of convenience and efficiency that has never been achieved before. Even though the most important advantage of the distributed network is raising the level of security, the problem of security vulnerabilities with the extended networks remains. This paper is devoted to a novel strategy of Federated Learning (FL) that could become an applied solution for enhancing the safety of the IoT. Therefore, based on its decentralized knowledge process, FL allows IoT devices to cooperate in achieving common purposes without endangering data pri vacy. The paper uses this thinking method to deal with scalability, model personalization, and non-IID data that aren’t IID distributing, suggesting solutions through model aggregation techniques or Artificial Intelligence (AI). Experimental evidence highlights that FL is very useful in enhancing IoT security irrespective of the diversity of its applications. To this end, residents of smart homes experienced a 17% increase in detecting the anomalies through the setting up of FL. This situation was replicated in the industrial internet of Things, where the false positive rates were reduced from 20% to 5%, thus improving the system’s efficiency. Furthermore, in the FL context in healthcare IoT ecosystems, this blazes a trail for privacy-preserving data analytics, preserving patient confidentiality and systematic profiling of noteworthy health trends. These findings thus demonstrate that FL is a feasible way of dealing with the security challenges of IoT scalable, promptly and in a manner that maintains user privacy. The article takes part in a conversation about ways to strengthen the security of IoT networks. Such a framework is based on the computational power of IoT devices. It allows us to detect and prevent threats in time. Nonetheless, it urges extensive R&D attempts to be introduced to develop better security solutio
Peer-to-peer distributed computer architecture are taken into consideration in order to distribute computer assets like storage, comfortable, and CPU cycles openly deprived of consuming a middle scheme or a central se...
详细信息
ISBN:
(数字)9781665474979
ISBN:
(纸本)9781665474986
Peer-to-peer distributed computer architecture are taken into consideration in order to distribute computer assets like storage, comfortable, and CPU cycles openly deprived of consuming a middle scheme or a central server. It can be difficult to Upkeep of load balancing on diverse peer-to-peer networks, and various previous research have provided state balancing algorithms for the demand aspect of load balance. For effective load balancing in dispersed heterogeneous peer networks, the prior work developed Processing Heterogeneous Data using Time - Peer Nodes. Using the Dynamic Time Warping (DTW) technique, load-demand balancing factors for peer servers are determined to a certain degree. The prior work solely discussed the peer node's liveliness in the heterogeneous network. In this work, we will provide the subsequent load-demand element generated as of DTW, peer server giving out cycle requirements are recognized utilizing Appropriation of Duty Cycle Data(ADCD) Technique in order to improve the previous study. In its active state, peer node servers examine their processing cycle needs and distribute data to other nodes in accordance with their duty cycles. If there is a load imbalance, peer node servers are used to distribute the load using a node collection policy created on ADCD abundant demonstration? Performance of the proposed Diverse cycle of a peer node server analyzer with an existing time variant utilizing DCPS-ADCD & NSS and the ADCD approach Using data from diverse peer networks that have been taken from major internet service providers, a P2P network that uses the Dynamic Time Warping algorithm is experimentally assessed. The efficiency is calculated based on the duty cycle count, energy usage, and load.
Binaural source localization is a popular technique in various applications,such as hearing aids,mobile robot,video conference,***,robust binaural cues estimate and suitable localization strategy are always limiting i...
详细信息
Binaural source localization is a popular technique in various applications,such as hearing aids,mobile robot,video conference,***,robust binaural cues estimate and suitable localization strategy are always limiting its *** this paper,a new algorithm for binaural sound source localization is presented,which is a two-layer *** the first layer,a spectral weighting generalized cross correlation-phase transformation(GCC-PHAT) method is presented for robust time-delay estimation,by which the probabilistic azimuths of sound source are *** the second layer,an improved algorithm is introduced,which is named Compensated Interaural Intensity Difference(CUD).Based on the probabilistic azimuth localization results and CUD features,spatial grid matching(SGM) is presented to provide a Bayesian model for localizing azimuth and *** with three other algorithms,experimental results show that the proposed method has a robust result even in noisy environments.
Robust hand tracking is a great challenge due to human hand39;s small size and drastic appearance ***,machine learning especially online learning methods have shown their promising ability in object *** paper succes...
详细信息
Robust hand tracking is a great challenge due to human hand's small size and drastic appearance ***,machine learning especially online learning methods have shown their promising ability in object *** paper successfully achieved hand tracking under a lately popular online learning framework named Tracking-Learning-Detection(TLD)by a win-win thought that hand tracking and posture recognition can benefit from each ***,the object model is extended in order to import posture recognition which is done without extra recognition *** turn,the introducing of hand postures enhance hand tracking since the tracker is adaptive to different hand *** last,skin color is sufficiently applied in every module(tracking,learning and detection) of TLD further improving the speed and accuracy of *** show that the proposed method works well on hand tracking with the additional ability to recognize some given hand postures under various difficulties.
暂无评论