Quantum annealing has been applied to combinatorial optimization problems in recent years. In this paper we study the possibility to use quantum annealing for solving the combinatorial FIFO Stack-Up problem, where bin...
详细信息
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ...
详细信息
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe...
详细信息
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. However, achieving robust and secure SI in both open and closed environments remains challenging. To address this issue, researchers have explored new techniques that enable computers to better understand and interact with humans. Smart systems leverage Artificial Neural Networks (ANNs) to mimic the human brain in identifying speakers. However, speech signals often suffer from interference, leading to signal degradation. The performance of a Speaker Identification System (SIS) is influenced by various environmental factors, such as noise and reverberation in open and closed environments, respectively. This research paper is concerned with the investigation of SI using Mel-Frequency Cepstral Coefficients (MFCCs) and polynomial coefficients, with an ANN serving as the classifier. To tackle the challenges posed by environmental interference, we propose a novel approach that depends on symmetric comb filters for modeling. In closed environments, we study the effect of reverberation on speech signals, as it occurs due to multiple reflections. To address this issue, we model the reverberation effect with comb filters. We explore different domains, including time, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Discrete Sine Transform (DST) domains for feature extraction to determine the best combination for SI in case of reverberation environments. Simulation results reveal that DWT outperforms other transforms, leading to a recognition rate of 93.75% at a Signal-to-Noise Ratio (SNR) of 15 dB. Additionally, we investigate the concept of cancelable SI to ensure user privacy, while maintaining high recognition rates. Our simulation results show a recognition rate of 97.5% at 0 dB using features extracted from speech signals and their DCTs. Fo
This paper presents progress in the development of a virtual commissioning environment for the validation of intelligent mechatronic systems with the following properties: 1) decentralised control architecture without...
详细信息
This letter presents a novel method to enable beam steering optimization for secure communications and resilience against radio tracking in an intelligent reflecting surfaces-enabled multiple-input multiple-output dua...
详细信息
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte...
详细信息
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and attenuated. Hazy media present difficulties in a variety of applications due to the reduced contrast and loss of essential information. In response, dehazing techniques have been introduced to bring hazy videos and images back to clarity. Here, we provide a novel technique for eliminating haze. It comprises preprocessing steps before dehazing. Preprocessing is applied to hazy images through homomorphic processing and Contrast Limited Adaptive Histogram Equalization (CLAHE). We present a dehazing technique referred to as the pre-trained Feature Fusion Attention Network (FFA-Net) that directly lets dehazed images be restored from hazy or preprocessed hazy inputs without requiring the determination of atmospheric factors, such as air light and transmission maps. The FFA-Net architecture incorporates a Feature Attention (FA) method to do this task. We assess the proposed technique in a variety of circumstances, including visible frames, Near-Infrared (NIR) frames, and real-world hazy images. Evaluation criteria like entropy, correlation, and Peak Signal-to-Noise Ratio (PSNR) are used to compare the quality of dehazed frames or images to their hazy counterparts. Furthermore, histogram analysis and spectral entropy are adopted to determine the effectiveness of the proposed technique in comparison to existing dehazing techniques. Comparative results are presented for both real-world and simulated environments. The benefits of the proposed technique are demonstrated by a comparison of the results obtained from the standalone pre-trained FFA-Net and the proposed comprehensive methodology. Moreover, a thorough assessment is carried out for comparing the effectiveness of the proposed FFA-Net technique to those of some current dehazing techniques on real hazy images. T
We used a Convolutional Neural Network (CNN) to reconstruct the electromagnetic imaging of a perfect conductor in half-space through the traverse magnetic wave. Since the conventional iterative algorithm is time-consu...
详细信息
Accurate indoor localization is crucial for enabling 6G applications, such as smart homes, augmented reality, and advanced healthcare systems. Optical wireless systems utilizing Light-Emitting Diodes (LEDs) offer cent...
详细信息
Spacecraft charging causes notorious issues for low-energy plasma measurements. The charged particles are accelerated towards or repelled from the spacecraft surface, affecting both their energy and travel direction. ...
详细信息
This paper proposes an on-line remedial action scheme (OLRAS) in order to mitigate the voltage violations caused by false data injection attacks (FDIAs) targeting under load tap changing (ULTC) transformers in smart d...
详细信息
暂无评论