Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe...
详细信息
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. However, achieving robust and secure SI in both open and closed environments remains challenging. To address this issue, researchers have explored new techniques that enable computers to better understand and interact with humans. Smart systems leverage Artificial Neural Networks (ANNs) to mimic the human brain in identifying speakers. However, speech signals often suffer from interference, leading to signal degradation. The performance of a Speaker Identification System (SIS) is influenced by various environmental factors, such as noise and reverberation in open and closed environments, respectively. This research paper is concerned with the investigation of SI using Mel-Frequency Cepstral Coefficients (MFCCs) and polynomial coefficients, with an ANN serving as the classifier. To tackle the challenges posed by environmental interference, we propose a novel approach that depends on symmetric comb filters for modeling. In closed environments, we study the effect of reverberation on speech signals, as it occurs due to multiple reflections. To address this issue, we model the reverberation effect with comb filters. We explore different domains, including time, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Discrete Sine Transform (DST) domains for feature extraction to determine the best combination for SI in case of reverberation environments. Simulation results reveal that DWT outperforms other transforms, leading to a recognition rate of 93.75% at a Signal-to-Noise Ratio (SNR) of 15 dB. Additionally, we investigate the concept of cancelable SI to ensure user privacy, while maintaining high recognition rates. Our simulation results show a recognition rate of 97.5% at 0 dB using features extracted from speech signals and their DCTs. Fo
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra...
详细信息
作者:
Yau, Yeu-TorngDepartment of Ph.D. Program
Prospective Technology of Electrical Engineering and Computer Science National Chin-Yi University of Technology Taichung No.57 Sec. 2 Zhongshan Rd. Taiping Dist Taichung41170 Taiwan
To provide a hold-up time function in DC-DC supplies for cell site stations or data centers, using a boost converter with a bulk output capacitor as a front-end converter stage is a simple and highly cost-effective so...
详细信息
The demand for continual machine learning in the context of limited computational resources and data availability is critical in the evolving landscape of the connected digital world. Current network applications pred...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
In this paper, we consider partial, feature-oriented digital twins of several virtual museums and formulate an approach to assessing them from the viewpoint of their reliability. Although the formulation specifically ...
详细信息
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte...
详细信息
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and attenuated. Hazy media present difficulties in a variety of applications due to the reduced contrast and loss of essential information. In response, dehazing techniques have been introduced to bring hazy videos and images back to clarity. Here, we provide a novel technique for eliminating haze. It comprises preprocessing steps before dehazing. Preprocessing is applied to hazy images through homomorphic processing and Contrast Limited Adaptive Histogram Equalization (CLAHE). We present a dehazing technique referred to as the pre-trained Feature Fusion Attention Network (FFA-Net) that directly lets dehazed images be restored from hazy or preprocessed hazy inputs without requiring the determination of atmospheric factors, such as air light and transmission maps. The FFA-Net architecture incorporates a Feature Attention (FA) method to do this task. We assess the proposed technique in a variety of circumstances, including visible frames, Near-Infrared (NIR) frames, and real-world hazy images. Evaluation criteria like entropy, correlation, and Peak Signal-to-Noise Ratio (PSNR) are used to compare the quality of dehazed frames or images to their hazy counterparts. Furthermore, histogram analysis and spectral entropy are adopted to determine the effectiveness of the proposed technique in comparison to existing dehazing techniques. Comparative results are presented for both real-world and simulated environments. The benefits of the proposed technique are demonstrated by a comparison of the results obtained from the standalone pre-trained FFA-Net and the proposed comprehensive methodology. Moreover, a thorough assessment is carried out for comparing the effectiveness of the proposed FFA-Net technique to those of some current dehazing techniques on real hazy images. T
There is a significant number of discussions lately, at both government agencies and private industry, about sending crewed missions further into space. Sending astronauts back to the Moon and, for the first time, to ...
详细信息
There is a significant number of discussions lately, at both government agencies and private industry, about sending crewed missions further into space. Sending astronauts back to the Moon and, for the first time, to Mars seems to make space enthusiasts around the world excited given the noteworthy tests and preparations going on in the last few years. The decision to launch crewed missions into space depends primarily on three aspects: technology, budget, and mission risk. Even when the first two aspects are addressed, the third question still remains: is it safe enough? Generally, Safety and Mission Assurance (S&MA) for space systems is taught in space systems programs from an operations standpoint. There are very few to no courses across the USA that address space S&MA from the design engineering perspective. There is also limited teaching of ethics-based safety culture in the engineeringprograms offered across the country. The resultant gap between graduates’ knowledge of space S&MA and the needed skills to conduct design engineering of space systems is, at the moment, mostly filled by the space agencies and private space industry. The graduate course framework presented in this paper is built on a student-centered approach through customized case-study experiences that promotes understanding and motivation, which are significant aspects of making risk-based decisions with considerations to safeguarding human lives. By exploring the root causes of human space flight close calls, incidents, and mishaps, students can envision themselves in the space operational environment and can become aware of how design engineering, safety culture, and ethics act through a combined feedforward and feedback mechanism to ensure reliable and safe operations. Then, connecting back to the theoretical course material creates the student's understanding and motivation once they act as decision-makers after graduation. The proposed case study-based course framework also promotes crit
In this note, a new structure of Right Coprime Factorization (RCF) for nonlinear systems with uncertainty has been proposed based on a time-varying Bezout identity. This is inspired from the concept of dilation from h...
详细信息
This study introduces a novel control framework for human-drone interaction (HDI) in industrial warehouses, targeting pick-and-delivery operations. The goals are to enhance operator safety as well as well-being and, a...
详细信息
This study introduces a novel control framework for human-drone interaction (HDI) in industrial warehouses, targeting pick-and-delivery operations. The goals are to enhance operator safety as well as well-being and, at the same time, to improve efficiency and reduce production costs. To these aims, the speed and separation monitoring (SSM) operation method is employed for the first time in HDI, drawing an analogy to the safety requirements outlined in collaborative robots' ISO standards. The so-called protective separation distance is used to ensure the safety of operators engaged in collaborative tasks with drones. In addition, we employ the rapid upper limb assessment (RULA) method to evaluate the ergonomic posture of operators during interactions with drones. To validate the proposed approach in a realistic industrial setting, a quadrotor is deployed for pick-and-delivery tasks along a predefined trajectory from the picking bay to the palletizing area, where the interaction between the drone and a moving operator takes place. The drone navigates toward the interaction space while avoiding collisions with shelves and other drones in motion. The control strategy for the drone cruise navigation integrates simultaneously the time-variant artificial potential field (APF) technique for trajectory planning and the iterative linear quadratic regulator (LQR) controller for trajectory tracking. Differently, in the descent phase, the receding horizon LQR algorithm is employed to follow a trajectory planned in accordance with the SSM, which starts from the approach point at the border of the interaction space and ends in the volume with the operator's minimum RULA. The presented control strategy facilitates drone management by adapting the drone's position to changes in the operator's position while satisfying HDI safety requirements. The results of the proposed HDI framework simulations for the case study demonstrate the effectiveness of the method in ensuring a safe and er
暂无评论