Voice synthesizers still present several challenges in the speech of mathematical content, as spoken mathematics has quite peculiar rules. In the synthesized speech, pauses help blind and visually impaired students id...
详细信息
The generation and replication of network traffic are essential tasks for testing, analyzing, simulating, and evaluating the behavior and efficiency of systems, protocols, applications, and network services. However, ...
详细信息
ISBN:
(数字)9798350330366
ISBN:
(纸本)9798350330373
The generation and replication of network traffic are essential tasks for testing, analyzing, simulating, and evaluating the behavior and efficiency of systems, protocols, applications, and network services. However, it faces various challenges and limitations when generating or replicating network traffic in a realistic, responsive, and scalable manner, using appropriate models. This work proposes a modeling of a program for generating and replicating network traffic, called Forensic Training Traffic Generator (ForTT-Gen), aims to address the challenge associated with generating and replicating network traffic generated by malware by creating files that can be used in the analysis of network packets inherent to forensic analysts' training. ForTT-Gen is a tool that can generate and replicate network traffic using a hybrid model that combines the replication of real data and the generation of synthetic data through statistical techniques. Experimental results demonstrate the model's ability to reliably. Accurately reproducing the statistical patterns of the original traffic, is evidenced by a determination coefficient of 1 and a Pearson coefficient of 0.9, all within a 0,58 confidence interval with 95% certainty.
To model the periodicity of beats, state-of-the-art beat tracking systems use 'post-processing trackers' (PPTs) that rely on several empirically determined global assumptions for tempo transition, which work w...
详细信息
Origami structures have been widely explored in robotics due to their many potential advantages. Origami robots can be very compact, as well as cheap and efficient to produce. In particular, they can be constructed in...
详细信息
Alzheimer’s disease (AD) often presents only mild symptoms in its early stages, and as there is no direct diagnostic method currently available, many patients are diagnosed only after the condition has worsened. Cons...
详细信息
This paper presents a 2-D wireless ultrasound-microwave phase synchronization (UMPS) system for a Unmanned Aerial Vehicle (UAV) -based phased array. It is extended from its 1-D counterpart [6]. The UMPS system consist...
This paper presents a 2-D wireless ultrasound-microwave phase synchronization (UMPS) system for a Unmanned Aerial Vehicle (UAV) -based phased array. It is extended from its 1-D counterpart [6]. The UMPS system consists of multiple non-connected modules that operate in a leader-follower scheme for positioning and phase synchronization. The UMPS includes multiple non-connected modules that follow a leader-follower scheme for positioning and phase synchronization. The leader is the only reference point, to which followers locate their relative positions by Time-of-Flight (ToF) of ultrasound calibrated with microwave signal and synchronize its phase by on-board phase shifters. With a proper phase compensation, the UMPS modules can form a phased array with a 2D-variable spatial arrangement of antenna elements. In this work, the 2D-prototype UMPS exhibits a root-mean-square (RMS) positioning error at 9 mm and a 5.6° RMS phase error for synchronizing a 433 MHz continuous wave RF signal, which is satisfactory for forming a UAV-based phased array.
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD ...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD detection, with a focus on gender bias that can reduce the effectiveness of detection models. We examined how gender affects the performance of both Machine Learning (Support Vector Machine, Random Forest, Logistic Regression, XGBoost) and Deep Learning (Deep Neural Networks, Convolutional Neural Networks) models using the GBAD dataset. Our findings show that models trained on female audio outperform those trained on male audio, likely due to the expressive nature of female voice features and high-pitched artifacts in FAKE audio. This highlights the need for more robust, gender-sensitive detection systems. Future work should focus on developing adaptive models to reduce gender bias, improving security, and creating lightweight models for wider public use.
This study presents a 3D positioning method to enable precise phase synchronization among individual drones, which is the key for the drone-based spatially reconfigurable phased array [1]. The proposed system eliminat...
This study presents a 3D positioning method to enable precise phase synchronization among individual drones, which is the key for the drone-based spatially reconfigurable phased array [1]. The proposed system eliminates the dependency on GPS by enabling drones to locate each other as a cohesive unit. By employing a hierarchical structure consisting of leader and subleaders, coupled with an iterative method among drones, precise phase compensation is achieved.
To derive efficient sorting architectures constrained to application-specific input/output conditions, we present in this paper a systematic design methodology that can effectively prune dispensable compare-and-swap (...
详细信息
ISBN:
(数字)9798350330991
ISBN:
(纸本)9798350331004
To derive efficient sorting architectures constrained to application-specific input/output conditions, we present in this paper a systematic design methodology that can effectively prune dispensable compare-and-swap (CAS) units. Unlike the previous works resorting to heuristic approaches, the proposed framework exploits the zero-one principle to validate the pruning of a CAS unit at a time, generating the cost-optimized sorter architecture in an iterative manner with a reasonable complexity. In addition to the given input/output constraints, we newly develop the architecture options for the proposed framework, allowing more design spaces for finding the most attractive constrained-sorter design. For 8-list polar decoders, the proposed framework successfully reduces 70% of CAS units in the baseline full sorter, relaxing the area-time complexity by 35% compared with the state-of-the-art solutions.
暂无评论