In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca...
详细信息
We show that a classical spin liquid phase can emerge from an ordered magnetic state in the two-dimensional frustrated Shastry-Sutherland Ising lattice due to lateral confinement. Two distinct classical spin liquid st...
详细信息
We show that a classical spin liquid phase can emerge from an ordered magnetic state in the two-dimensional frustrated Shastry-Sutherland Ising lattice due to lateral confinement. Two distinct classical spin liquid states are stabilized: (i) long-range spin-correlated dimers, and (ii) exponentially decaying spin-correlated disordered states, depending on widths of W=3n, 3n+1 or W=3n+2,n being a positive integer. Stabilization of spin liquids in a square-triangular lattice moves beyond the conventional geometric paradigm of kagome, triangular, or tetrahedral arrangements of antiferromagnetic ions, where spin liquids have been discussed conventionally.
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe...
详细信息
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. However, achieving robust and secure SI in both open and closed environments remains challenging. To address this issue, researchers have explored new techniques that enable computers to better understand and interact with humans. Smart systems leverage Artificial Neural Networks (ANNs) to mimic the human brain in identifying speakers. However, speech signals often suffer from interference, leading to signal degradation. The performance of a Speaker Identification System (SIS) is influenced by various environmental factors, such as noise and reverberation in open and closed environments, respectively. This research paper is concerned with the investigation of SI using Mel-Frequency Cepstral Coefficients (MFCCs) and polynomial coefficients, with an ANN serving as the classifier. To tackle the challenges posed by environmental interference, we propose a novel approach that depends on symmetric comb filters for modeling. In closed environments, we study the effect of reverberation on speech signals, as it occurs due to multiple reflections. To address this issue, we model the reverberation effect with comb filters. We explore different domains, including time, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Discrete Sine Transform (DST) domains for feature extraction to determine the best combination for SI in case of reverberation environments. Simulation results reveal that DWT outperforms other transforms, leading to a recognition rate of 93.75% at a Signal-to-Noise Ratio (SNR) of 15 dB. Additionally, we investigate the concept of cancelable SI to ensure user privacy, while maintaining high recognition rates. Our simulation results show a recognition rate of 97.5% at 0 dB using features extracted from speech signals and their DCTs. Fo
In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication *** IoT paradigms like the Internet of Vehicle Things(IoVT)and the Intern...
详细信息
In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication *** IoT paradigms like the Internet of Vehicle Things(IoVT)and the Internet of Health Things(IoHT)create massive volumes of data every day which consume a lot of bandwidth and ***,to process such large volumes of data,the existing cloud computing platforms offer limited resources due to their distance from IoT ***,cloudcomputing systems produce intolerable latency problems for latency-sensitive real-time ***,a newparadigm called fog computingmakes use of computing nodes in the form of mobile devices,which utilize and process the real-time IoT devices data in orders of *** paper proposes workload-aware efficient resource allocation and load balancing in the fog-computing environment for the *** proposed algorithmic framework consists of the following components:task sequencing,dynamic resource allocation,and load *** consider electrocardiography(ECG)sensors for patient’s critical tasks to achieve maximum load balancing among fog nodes and to measure the performance of end-to-end delay,energy,network consumption and average *** proposed algorithm has been evaluated using the iFogSim tool,and results with the existing approach have been *** experimental results exhibit that the proposed technique achieves a 45%decrease in delay,37%reduction in energy consumption,and 25%decrease in network bandwidth consumption compared to the existing studies.
In modern technology environments, raising users’ privacy awareness is crucial. Existing eforts largely focused on privacy policy presentation and failed to systematically address a radical challenge of user motivati...
详细信息
Traditional Wireless Sensor Networks(WSNs)comprise of costeffective sensors that can send physical parameters of the target environment to an intended *** the evolution of technology,multimedia sensor nodes have becom...
详细信息
Traditional Wireless Sensor Networks(WSNs)comprise of costeffective sensors that can send physical parameters of the target environment to an intended *** the evolution of technology,multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target *** existence of multimedia sensors,integrated with effective signal processing and multimedia source coding approaches,has led to the increased application of Wireless Multimedia Sensor Network(WMSN).This sort of network has the potential to capture,transmit,and receive multimedia *** energy is a major source in WMSN,novel clustering approaches are essential to deal with adaptive topologies of WMSN and prolonged network *** this motivation,the current study develops an Enhanced Spider Monkey Optimization-based Energy-Aware Clustering Scheme(ESMO-EACS)for *** proposed ESMO-EACS model derives ESMO algorithm by incorporating the concepts of SMO algorithm and quantum *** proposed ESMO-EACS model involves the design of fitness functions using distinct input parameters for effective construction of clusters.A comprehensive experimental analysis was conducted to validate the effectiveness of the proposed ESMO-EACS technique in terms of different performance *** simulation outcome established the superiority of the proposed ESMO-EACS technique to other methods under various measures.
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source...
详细信息
Humankind is facing another deadliest pandemic of all times in history,caused by *** from this challenging pandemic,World Health Organization(WHO)considers tuberculosis(TB)as a preeminent infectious disease due to its...
详细信息
Humankind is facing another deadliest pandemic of all times in history,caused by *** from this challenging pandemic,World Health Organization(WHO)considers tuberculosis(TB)as a preeminent infectious disease due to its high infection ***,both TB and COVID-19 severely affect the lungs,thus hardening the job of medical practitioners who can often misidentify these diseases in the current ***,the time of need calls for an immediate and meticulous automatic diagnostic tool that can accurately discriminate both *** one of the preliminary smart health systems that examine three clinical states(COVID-19,TB,and normal cases),this study proposes an amalgam of image filtering,data-augmentation technique,transfer learning-based approach,and advanced deep-learning classifiers to effectively segregate these *** first employed a generative adversarial network(GAN)and Crimmins speckle removal filter on X-ray images to overcome the issue of limited data and *** pre-processed image is then converted into red,green,and blue(RGB)and Commission Internationale de l’Elcairage(CIE)color spaces from which deep fused features are formed by extracting relevant features using DenseNet121 and *** feature extractor extracts 1000 most useful features which are then fused and finally fed to two variants of recurrent neural network(RNN)classifiers for precise discrimination of threeclinical *** analysis showed that the proposed Bi-directional long-short-term-memory(Bi-LSTM)model dominated the long-short-termmemory(LSTM)network by attaining an overall accuracy of 98.22%for the three-class classification task,whereas LSTM hardly achieved 94.22%accuracy on the test dataset.
Quasi-Affine Transformation Evolutionary (QUATRE) algorithm is a kind of swarm-based collaborative optimization algorithm that solves the problem of a position deviation in a DE search by using the co-evolution matrix...
详细信息
Although attention weights have been commonly used as a means to provide explanations for deep learning models, the approach has been widely criticized due to its lack of faithfulness. In this work, we present a simpl...
详细信息
暂无评论