Inspired by basic circuit connection methods,memristors can also be utilized in the construction of complex discrete chaotic *** investigate the dynamical effects of hybrid memristors,we propose two hybrid tri-memrist...
详细信息
Inspired by basic circuit connection methods,memristors can also be utilized in the construction of complex discrete chaotic *** investigate the dynamical effects of hybrid memristors,we propose two hybrid tri-memristor hyperchaotic(HTMH)mapping structures based on the hybrid parallel/cascade and cascade/parallel operations,*** the HTMH mapping structure with hybrid parallel/cascade operation as an example,this map possesses a spatial invariant set whose stability is closely related to the initial states of the *** distributions and bifurcation behaviours dependent on the control parameters are explored with numerical ***,the memristor initial offset-boosting mechanism is theoretically demonstrated,and memristor initial offset-boosting behaviours are numerically *** results clarify that the HTMH map can exhibit hyperchaotic behaviours and extreme multistability with homogeneous coexisting infinite *** addition,an FPGA hardware platform is fabricated to implement the HTMH map and generate pseudorandom numbers(PRNs)with high ***,the generated PRNs can be applied in Wasserstein generative adversarial nets(WGANs)to enhance training stability and generation capability.
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individua...
详细信息
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individuals exploit the recorded voices of legitimate users, leading to false confirmations—spoofing attacks. To overcome this limitation, this article presents an innovative solution by combining speech and online handwritten signatures to mitigate the risks associated with spoofing attacks in voice-based authentication systems because a person has to be present in front of the system to produce an online handwritten signature. To accomplish this objective, this work proposes a novel bidirectional Legendre memory unit (BLMU), a type of recurrent neural network (RNN), for person authentication (verification) and recognition. The Legendre memory unit (LMU) is an innovative memory cell for RNNs that efficiently retains temporal/non-temporal sequential information over a long period with minimal resources. It achieves information orthogonalization by solving coupled ordinary differential equations (ODEs) and leveraging Legendre polynomials, ensuring effective data representation. The proposed framework for person authentication and recognition comprises seven convolution layers, four BLMU layers, two dense layers, and one output layer. The performance of the proposed BLMU-based deep learning framework has been evaluated on a self-generated/private dataset of combined feature matrix of voice signals and online handwritten signatures in the Devanagari script. To assess performance, experiments have also been conducted using various RNN architectures, such as LSTM, BLSTM, and ordinary differential equation recurrent neural network (ODE-RNN), to have a performance comparison with the proposed BLMU-based deep learning (DL) framework. The results demonstrate the superiority of the proposed BLMU-based DL framework in enhancing the accuracy of person verification systems,
In the growing information retrieval (IR) world, selecting suitable keywords and generating queries is important for effective retrieval. Modern database applications need a sophisticated interface for automatically u...
详细信息
Day by day,biometric-based systems play a vital role in our daily *** paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emoti...
详细信息
Day by day,biometric-based systems play a vital role in our daily *** paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emotions based on voice recognition and control a few electronic peripherals for alert *** proposed smart assistant aims to provide a support to the people through buzzer and light emitting diodes(LED)alert signals and it also keep track of the places like households,hospitals and remote areas,*** proposed approach is able to detect seven emotions:worry,surprise,neutral,sadness,happiness,hate and *** key elements for the implementation of speech emotion recognition are voice processing,and once the emotion is recognized,the machine interface automatically detects the actions by buzzer and *** proposed system is trained and tested on various benchmark datasets,i.e.,Ryerson Audio-Visual Database of Emotional Speech and Song(RAVDESS)database,Acoustic-Phonetic Continuous Speech Corpus(TIMIT)database,Emotional Speech database(Emo-DB)database and evaluated based on various parameters,i.e.,accuracy,error rate,and *** comparing with existing technologies,the proposed algorithm gave a better error rate and less *** rate and time is decreased by 19.79%,5.13 *** the RAVDEES dataset,15.77%,0.01 s for the Emo-DB dataset and 14.88%,3.62 for the TIMIT *** proposed model shows better accuracy of 81.02%for the RAVDEES dataset,84.23%for the TIMIT dataset and 85.12%for the Emo-DB dataset compared to Gaussian Mixture Modeling(GMM)and Support Vector Machine(SVM)Model.
Hematoxylin and eosin (H&E) staining are the key sources for identifying breast cancer patterns with different colors and shapes of nuclei cells for segmenting histopathology nucleus images. In nucleus cells, the ...
详细信息
The software development projects’ testing part is usually expensive and complex, but it is essential to gauge the effectiveness of the developed software. Software Fault Prediction (SFP) primarily serves to detect f...
详细信息
In this paper we provided an insightful exploration into the critical role of feature matching in enhancing the efficacy of e-commerce recommendation systems. By meticulously analyzing user data and product characteri...
详细信息
Suspicious activity recognition (SAR) is an active research field in computer vision and image processing due to the rapid demand for intelligent video surveillance systems. However, current automated systems focus to...
详细信息
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti...
详细信息
In recent years, significant progress has been made in knowledge graph representation learning, which has shown promising results in knowledge computing applications such as relation extraction and knowledge reasoning...
详细信息
暂无评论