Showing 1,761 - 1,780 results of 4,331 for search 'machine patterns', query time: 0.14s Refine Results
  1. 1761
  2. 1762

    Spoofing speech detection algorithm based on joint feature and random forest by Jiaqi YU, Zhihua JIAN, Jia XU, Lin YOU, Yunlu WANG, Chao WU

    Published 2022-06-01
    “…In order to describe the characteristic information of the speech signal more comprehensively and improve the detection rate of camouflage, a spoofing speech detection method based on the combination of uniform local binary pattern texture feature and constant Q cepstrum coefficient acoustic feature was proposed, which used random forest as the classifier model.The texture feature vector in the speech signal spectrogram was extracted by using the uniform local binary mode, and the joint feature was formed with the constant Q cepstrum coefficient.Then, the obtained joint feature vector was used to train the random forest classifier, so as to realize the camouflage speech detection.In the experiment, the performances of several spoofing detection systems constructed by other feature parameters and the support vector machine classifier model were compared, and the results show that the proposed speech spoofing detection system combined with the joint feature and the random forest model has the best performance.…”
    Get full text
    Article
  3. 1763

    Spoofing speech detection algorithm based on joint feature and random forest by Jiaqi YU, Zhihua JIAN, Jia XU, Lin YOU, Yunlu WANG, Chao WU

    Published 2022-06-01
    “…In order to describe the characteristic information of the speech signal more comprehensively and improve the detection rate of camouflage, a spoofing speech detection method based on the combination of uniform local binary pattern texture feature and constant Q cepstrum coefficient acoustic feature was proposed, which used random forest as the classifier model.The texture feature vector in the speech signal spectrogram was extracted by using the uniform local binary mode, and the joint feature was formed with the constant Q cepstrum coefficient.Then, the obtained joint feature vector was used to train the random forest classifier, so as to realize the camouflage speech detection.In the experiment, the performances of several spoofing detection systems constructed by other feature parameters and the support vector machine classifier model were compared, and the results show that the proposed speech spoofing detection system combined with the joint feature and the random forest model has the best performance.…”
    Get full text
    Article
  4. 1764

    Assessing training needs and influencing factors among personnel at centers for disease control and prevention in northeast China: a cross-sectional study framed by SDT and TPB usi... by Kexin Wang, Peng Wang, Min Wei, Yanping Wang, Huan Liu, Ruiqian Zhuge, Qunkai Wang, Nan Meng, Yiran Gao, Yuxuan Wang, Lijun Gao, Jingjing Liu, Xin Zhang, Mingli Jiao, Qunhong Wu

    Published 2025-06-01
    “…SHapley Additive exPlanations (SHAP) were used to explain the output of the optimal machine learning model. Results This study identified the four subgroups of competency patterns, including novice (25.3%), public health experts (15.1%), potential expansion talents (24.7%), and versatile talents (34.9%). …”
    Get full text
    Article
  5. 1765

    Tool Wear Monitoring Technology and Its Application in Heavy Cutting by CHENG Yao-nan, DING Ya, GAI Xiao-yu, GUAN Rui, MA Chun-jie

    Published 2022-02-01
    “…In the modern cutting system, the wear or damage of cutting tools will lead to the failure of the workpiece and even the damage of machine tools.Tool condition monitoring can effectively improve the adverse effects of wear and breakage on the cutting process, so it is of great significance to apply tool condition monitoring to the process of heavy cutting water chamber head to improve the cutting efficiency and machining quality of workpieces. …”
    Get full text
    Article
  6. 1766

    PCA-GWO-KELM Optimization Gait Recognition Indoor Fusion Localization Method by Xiaoyu Ji, Xiaoyue Xu, Suqing Yan, Jianming Xiao, Qiang Fu, Kamarul Hawari Bin Ghazali

    Published 2025-06-01
    “…In this method, 30-dimensional motion features for different motion patterns are extracted from inertial measurement units. …”
    Get full text
    Article
  7. 1767

    Direct scribing of metal microgratings using sawtoothed cemented carbide tools with Johnson-Cook model-based plastic deformation simulation by Minwook Kim, Dae Bo Sim, Yong Tae Kim, Bo Hyun Kim, Jong G. Ok

    Published 2025-10-01
    “…We demonstrate the DISCRIM (DIrect SCRIbing of Metals) process for the continuous and scalable precision machining of metal micrograting structures, which utilizes direct mechanical scribing of a sawtooth–patterned cemented carbide tool edge over a metal workpiece. …”
    Get full text
    Article
  8. 1768

    Dementia Scale Score Classification Based on Daily Activities Using Multiple Sensors by Akira Minamisawa, Shogo Okada, Ken Inoue, Mami Noguchi

    Published 2022-01-01
    “…The experimental results show that a maximum accuracy of 0.871 was obtained with a linear support vector machine (SVM) model by fusing the door, location, and sleep features and by clustering activity patterns using the X-means algorithm.…”
    Get full text
    Article
  9. 1769

    A Data-Driven Approach to Mitigate Evolving Volumetric Attacks in Programmable Networks by Muhammad Saqib, Halima Elbiaze, Roch H. Glitho

    Published 2025-01-01
    “…In-network machine learning (ML) offers a cutting-edge approach for promptly detecting malicious traffic. …”
    Get full text
    Article
  10. 1770
  11. 1771

    Time Series Modelling and Predictive Analytics for Sustainable Environmental Management—A Case Study in El Mar Menor (Spain) by Rosa Martínez, Ivan Felis, Mercedes Navarro, J. Carlos Sanz-González

    Published 2023-11-01
    “…In this study on data science and machine learning, time series analysis plays a key role in predicting evolving data patterns. …”
    Get full text
    Article
  12. 1772

    BCAST IDS: A Novel Network Intrusion Detection System for Broadcast Networks by Javier Gombao

    Published 2025-01-01
    “…A modern approach to enhancing the capabilities of NIDSs is the use of machine learning (ML) algorithms that predict attacks based on data. …”
    Get full text
    Article
  13. 1773

    Development of an artificial intelligence system for the forecasting of infectious diseases by A. A. Kuzin, R. I. Glushakov, S. A. Parfenov, K. V. Sapozhnikov, A. A. Lazarev

    Published 2023-09-01
    “…Evolution of data science have led to the emergence of promising artificial intelligence (AI) algorithms and tools for the forecasting of infectious diseases. Employing machine learning algorithms, AI systems can rapidly analyze a large amount of data, extract specific disease patterns, and screen for the most efficient AI instruments in relation to specific tasks, thus contributing to prevention, diagnostics, and treatment of infectious diseases in the context of personalized medicine. …”
    Get full text
    Article
  14. 1774
  15. 1775
  16. 1776

    Disulfide bond-related gene signature development for bladder cancer prognosis prediction and immune microenvironment characterization by Hua Huang, Haiyan Shao, Yifan Wang, Lili Ge

    Published 2025-05-01
    “…By integrating data from TCGA and GEO cohorts, we developed a Disulfide-Related Prognostic Signature (DRPS) using ten machine learning algorithms. Single-cell RNA sequencing (scRNA-seq) elucidated the cell subtype-specific expression patterns of disulfide bond regulatory genes, while immune microenvironment and drug sensitivity analyses validated its clinical translational potential. qRT-PCR experiments confirmed differential expression patterns of core genes in bladder cancer cell lines. …”
    Get full text
    Article
  17. 1777

    Unsupervised learning analysis on the proteomes of Zika virus by Edgar E. Lara-Ramírez, Gildardo Rivera, Amanda Alejandra Oliva-Hernández, Virgilio Bocanegra-Garcia, Jesús Adrián López, Xianwu Guo

    Published 2024-11-01
    “…Unsupervised learning (UL), a form of machine learning algorithm, can be applied on the datasets without the need of known information for training. …”
    Get full text
    Article
  18. 1778
  19. 1779

    INTEGRATING ARTIFICIAL NEURAL NETWORKS FOR DEVELOPING TELEMEDICINE SOLUTION by Mihaela GHEORGHE

    Published 2015-06-01
    “…These can be used for assisting physicians or other clinical staff in the process of taking decisions under uncertainty. Thus, machine learning methods which are specific to this technology are offering an approach for prediction based on pattern classification. …”
    Get full text
    Article
  20. 1780