In this paper, a Connected Dominating Set (CDS) construction algorithm CSCDS (Connected Subset based CDS) is proposed, which is based on the connected subset concept. The CSCDS contains two main stages, which are domi...
详细信息
Real-time information Service System for the Meteorological Screen Base on CDMA is designed, a complete set of information gathering, processing, aggregating and publishing system for weather prediction products, disa...
详细信息
Real-time information Service System for the Meteorological Screen Base on CDMA is designed, a complete set of information gathering, processing, aggregating and publishing system for weather prediction products, disaster warning information, Typhoon real-time position information, weather information every ten minutes. Real-time weather information to the grouping of the LED display live information and notice is automatically released. The system contains user classification and display management module, disaster warning information into the module, all kinds Notice entry module, real-time weather information collected the summary module as well as real-time weather information automatically release the module.
A general wireless sensor network (WSN) is a system composed of a large number of sensor nodes. In the WSN system, all sensor nodes are responsible for sensing the interested events and transmitting the related inform...
详细信息
Adaptability and controllability are the major advantages of statistical parametric speech synthesis (SPSS) over unit-selection synthesis. Recently, deep neural networks (DNNs) have significantly improved the performa...
详细信息
ISBN:
(纸本)9781509024018
Adaptability and controllability are the major advantages of statistical parametric speech synthesis (SPSS) over unit-selection synthesis. Recently, deep neural networks (DNNs) have significantly improved the performance of SPSS. However, current studies are mainly focusing on the training of speaker-dependent DNNs, which generally requires a significant amount of data from a single speaker. In this work, we perform a systematic analysis of the training of multi-speaker average voice model (AVM), which is the foundation of adaptability and controllability of a DNN-based speech synthesis system. Specifically, we employ the i-vector framework to factorise the speaker specific information, which allows a variety of speakers to share all the hidden layers. And the speaker identity vector is augmented with linguistic features in the DNN input. We systematically analyse the impact of the implementations of ivectors and speaker normalisation.
Automatic detection salient region of images is widely used in image applications such as image editor, segmentation, retrieval and object recognition. The AC algorithm is one of the typical algorithms, which uses reg...
详细信息
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi...
详细信息
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a...
详细信息
The internet of things (loT) attracts great interest in many application domains concerned with monitoring and :ontrol of physical phenomena. However, application devel- opment is still one of the main hurdles to a wide adoption of IoT technology. Application development is done at a low level, very close to the operating system and requires pro- grammers to focus on low-level system issues. The under- lying APIs can be very complicated and the amount of data collected can be huge. This can be very hard to deal with as a developer. In this paper, we present a runtime model based approach to IoT application development. First, the manage- ability of sensor devices is abstracted as runtime models that are automatically connected with the corresponding systems. Second, a customized model is constructed according to a personalized application scenario and the synchronization be- tween the customized model and sensor device runtime mod- els is ensured through model transformation. Thus, all the application logic can be carried out by executing programs on the customized model. An experiment on a real-world ap- plication scenario demonstrates the feasibility, effectiveness, and benefits of the new approach to IoT application develop- ment.
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The resu...
详细信息
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The results over three types of simulation data showed that this proposed CBBO method gave better performance than chaotic particle swarm optimization, genetic algorithm, firefly algorithm, and quantum-behaved particle swarm optimization. In all, our CBBO method is effective in centroid-based clustering.
Recently, password based authenticated key exchange (or called PAKE for short) with chaotic maps has been received much attention for researchers. In 2013, Xie et al. proposed a three party PAKE scheme (based on chaot...
详细信息
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to...
详细信息
ISBN:
(纸本)9781467368513
Independent spanning trees(ISTs) have applications in interconnection networks such as reliable communication protocols, and secure message distribution, etc. In this paper, we use BIST to denote the IST isomorphic to binomial-like tree. We propose an algorithm to construct n BISTs and the algorithm can be parallelized on PQ n to run in O(N) time, where N = 2 n .
暂无评论