This paper analyzes how emotional speech influ-ences the quality assessment process. The objective metrics for speech quality assessment are usually evaluated with neutral speech recordings, but human interaction freq...
详细信息
The exponential growth of the Internet of Things (IoT) ecosystems has raised significant cybersecurity concerns. Deep learning (DL)-based methods have shown promising performance in detecting potential cyber threats i...
详细信息
The integration of drone technology and Artificial Intelligence (AI) has opened up new possibilities for wildlife conservation and habitat monitoring. In this paper, we present a new system for efficiently and accurat...
With the advancements in voltage source converter(VSC)technology,VSC based high voltage direct current(VSCHVDC)systems provide system operators with a prospective approach to enhance system operating stability and ***...
详细信息
With the advancements in voltage source converter(VSC)technology,VSC based high voltage direct current(VSCHVDC)systems provide system operators with a prospective approach to enhance system operating stability and *** addition to long-distance transmission,the VSC-HVDC system can also provide multiple ancillary services,such as frequency regulation,due to its power ***,if a time delay exists in the control signal,the VSC-HVDC system may bring destabilizing influences to the system,which will decrease the system resilience under the *** order to reduce control deviation caused by time delay,in this paper,a small signal model is first conducted to analyze the impact of time delay on system *** a time-delay correction control strategy for HVDC frequency regulation control is developed to reduce the influence of the time *** control performance of the proposed time-delay correction control is verified both in the established small signal model and the runtime simulation in a modified IEEE 39 bus *** results indicate that the proposed time-delay correction control strategy shows significant improvement in system stability.
Intrusion Detection Systems (IDSs) are an essential part of modern-day cybersecurity defenses, enabling the detection of potential malicious activities within network and computer systems. Although multiple techniques...
详细信息
Most near-field (NF) localization algorithms cannot deal with the underdetermined case, while those which can are computationally expensive due to employment of fourth-order cumulants. In this work, a low-complexity s...
详细信息
In modern image classification tasks, the data is insufficient due to time or money cost constraints, which affects the generalization and accuracy of the model. This paper proposes a random erasure method based on gr...
详细信息
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu...
详细信息
Generative AI (GenAI) chatbots have taken the world by storm with their ability to summarize information and produce complex natural language *** the same time, the demand for computerscience education has grown *** ...
详细信息
Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable to presentation attacks, such as photo-paper, paper printo...
详细信息
暂无评论