The most common and general medium via which we humans convey or communicate our thoughts, emotions, feelings or ideas artlessly is by speech or articulation. Blending of this artless way of speech with the technologi...
详细信息
ISBN:
(纸本)9789380544519
The most common and general medium via which we humans convey or communicate our thoughts, emotions, feelings or ideas artlessly is by speech or articulation. Blending of this artless way of speech with the technological advancements of AI, has given rise to the importance of building emotion recognition systems from speech today. Even more, the speech/articulation emotion recognition system presented here is also to contribute in and facilitate various emerging applications of today like, in detecting persons' physiological state (as in lie detectors), also be used in forensics, medicine. The proposed work identifies/associates an appropriate label/emotion for the respective emotion from speech presented in the form of an audio file (.wav format). About 4240 audio samples are taken. 1440, 2800 samples from RAVDESS and TESS datasets are considered respectively. After this process of data collection, features are separately extracted for each audio dataset mentioned above. Energy, pitch, ZCR, co-efficient of Mel frequency ceptrum (MFCC) are some of the features considered in this study. Furthermore, clubbing and merging of 2 datasets is performed resulting in a total of 4240 rows and 24 columns (features/characteristics including 1class label) of audio samples. The resulting 4240 samples of feature dataset is split/bifurcated into training and testing set by considering 3 different possibilities/instances viz;60%-40% ratio, 70%-30% ratio, 80%-30% ratio. The models namely CNN, Random forest and Support Vector Machine are trained to classify the dataset into 8 different emotions (neutral, calm, happy, sad, angry, fearful, disgust, surprise). An attempt to implement the models using two very essential disciplines of AI i.e. Machine Learning and Deep Learning is made here. The accuracy or results are depicted by generating confusion matrices on test data for CNN, RF and SVM models (Each model is trained and test across 3 different ratios viz;60%-40%, 70%-30%, 80%-20%). C
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing *** task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog *** process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource *** this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local *** balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization *** FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response *** relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
The fact that deaths from bore wells persist in India is highly alarming, particularly when young people are involved. Since 2009, there have been more than 40 documented child deaths, and the National Disaster Respon...
详细信息
With the rapid development of Internet of Things (loT) technology, the vast amount of data generated by its devices has raised widespread concern for user privacy pro-tection. Differential Privacy, as a stringent priv...
详细信息
Recently, Semi-factual explanations have gained popularity in the eXplainable AI (XAI) community. They provide "even if" justifications to indicate what key input features could change without changing the o...
详细信息
Kupyna is an AES-like hash function that has been confirmed as the Ukrainian hash standard DSTU 7564:2014 in 2015. In this paper, we present some preimage attacks and collision attacks on Kupyna. We combine guess-and-...
详细信息
Packet classification is an essential part of computer networks. Existing algorithms propose a partition process to address the memory explosion problem of the decision tree algorithm caused by the huge number of rule...
详细信息
This research study investigates human responses to malware attacks, focusing on attacker motivations, individual reactions, and key factors influencing user vulnerability and resilience. Using a structured survey que...
详细信息
Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed t...
详细信息
With the continuous increase in the speed and quantity of network traffic, higher performance requirements are put forward for the NFV system. Traditional virtualization technology is limited by slowing down of increa...
详细信息
暂无评论