The performance of a speech emotion recognition(SER)system is heavily influenced by the efficacy of its feature extraction *** study was designed to advance the field of SER by optimizing feature extraction tech-nique...
详细信息
The performance of a speech emotion recognition(SER)system is heavily influenced by the efficacy of its feature extraction *** study was designed to advance the field of SER by optimizing feature extraction tech-niques,specifically through the incorporation of high-resolution Mel-spectrograms and the expedited calculation of Mel Frequency Cepstral Coefficients(MFCC).This initiative aimed to refine the system’s accuracy by identifying and mitigating the shortcomings commonly found in current ***,the primary objective was to elevate both the intricacy and effectiveness of our SER model,with a focus on augmenting its proficiency in the accurate identification of emotions in spoken *** research employed a dual-strategy approach for feature ***,a rapid computation technique for MFCC was implemented and integrated with a Bi-LSTM layer to optimize the encoding of MFCC ***,a pretrained ResNet model was utilized in conjunction with feature Stats pooling and dense layers for the effective encoding of Mel-spectrogram *** two sets of features underwent separate processing before being combined in a Convolutional Neural Network(CNN)outfitted with a dense layer,with the aim of enhancing their representational *** model was rigorously evaluated using two prominent databases:CMU-MOSEI and *** findings include an accuracy rate of 93.2%on the CMU-MOSEI database and 95.3%on the RAVDESS *** exceptional performance underscores the efficacy of this innovative approach,which not only meets but also exceeds the accuracy benchmarks established by traditional models in the field of speech emotion recognition.
Visual object tracking aims to continuously localize the target object of interest in a video *** one of the most fundamental problems in computer vision,visual object tracking has a long list of critical applications...
详细信息
Visual object tracking aims to continuously localize the target object of interest in a video *** one of the most fundamental problems in computer vision,visual object tracking has a long list of critical applications including video surveillance,autonomous driving,human-machine interaction,augmented reality,robotics,etc.,in which the tracking system provides the capacity to report target positions in real time for subsequent visual *** the past decades,visual object tracking has been extensively explored and has witnessed considerable progress,especially in deep-learning-based tracking.
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr...
详细信息
Visual object tracking is a traditional task in computer vision, which has developed with several decades. With the development of machine learning, correlation filter (CF) has been proposed with satisfying performanc...
详细信息
IoT data trading has greatly benefited the popularization of both the Internet of Things (IoT) and Artificial Intelligence of Things (AIoT). Current solutions mainly treat the dataset owned by each device as a commodi...
详细信息
The widespread impact of thyroid disease and its diagnosis is a challenging task for healthcare experts. The conventional technique for predicting such a vital disease is complex and time-consuming. A data-driven appr...
详细信息
The ability to continuously follow a target person in a dynamically changing environment remains a major challenge that indoor companion robots confront. Ongoing human following is complicated by close similarity matc...
详细信息
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho...
详细信息
This paper proposes a method that combines imitation learning and reinforcement learning to improve the learning performance of autonomous vehicles. The actor model was pre-trained using expert demonstration data from...
详细信息
Distributed Denial of Service, known as DDoS attacks, significantly compromise network security and availability. Certain DDoS detection methods utilize machine learning techniques, whereas others are based on statist...
详细信息
暂无评论