Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia...
详细信息
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.
Process monitoring plays a pivotal role in elucidating the intricate interplay among process, structure, and property in additive manufacturing production. The control of powder spreading affects not only particle adh...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
The software development projects’ testing part is usually expensive and complex, but it is essential to gauge the effectiveness of the developed software. Software Fault Prediction (SFP) primarily serves to detect f...
详细信息
In this paper,the effects of rare earth oxides on the micro structure and mechanical properties of nickelbased superalloys prepared by high-energy beam processing technology were critically *** focus is on the optimal...
详细信息
In this paper,the effects of rare earth oxides on the micro structure and mechanical properties of nickelbased superalloys prepared by high-energy beam processing technology were critically *** focus is on the optimal amount of rare earth oxides that can produce ideal *** attention was paid to their main strengthening mechanisms,including solid solution strengthening mainly in the form of solid solution dissolved in the nickel-based alloy and improving the microstructure of the alloy by grain refinement or fine grain strengthening produced by homogenizing the distribution phase.Y_(2)O_(3),La_(2)O_(3) and CeO_(2) rare earth oxides can also improve the fluidity of the alloy molten pool and reduce the segregation of alloying *** advantages can significantly improve the mechanical properties of the ***,this paper outlines the future research directions of rare earth oxides,aiming to expand their application potential.
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
The current study is defined by two main aims. An effective strategy for improving local search is to combine the Set Algebra-Based Heuristic Algorithm (SAHA) algorithm with the Nelder-Mead simplex method. The approac...
详细信息
Ensuring strong security procedures is crucial in the rapidly advancing realm of wireless sensor networks (WSNs) in order to protect sensitive data and preserve network integrity. The resource limitations and unpredic...
详细信息
暂无评论