R Cheng, C Bao, Z Cui - Applied sciences, 2020 - mdpi.com
Featured Application The proposed MASS can simulate multiple signals collected by microphone array in room acoustic environment for multi-channel speech coding and …
Y Jung, Y Choi, H Kim - 2019 IEEE Automatic Speech …, 2019 - ieeexplore.ieee.org
Voice activity detection (VAD), which classifies frames as speech or non-speech, is an important module in many speech applications including speaker verification. In this paper …
In the study, a new SDN in IoTs using deep learning techniques is used. In the first stage, the DBN applied to the input data to extract effective features of malware. The DBN consist of …
Identifying and categorizing network traffic is the initial step in determining what sorts of applications are traveling via the network. An internet service provider or network operator …
In telecommunication, 5G is a fifth-generation broadband cellular network technology standard that mobile operators around the world began rolling out in 2019 and is the …
Malware is any software deliberately intended to reason disturbance to a computer, attendant, customer, or computer network, escape secluded information, improvement illegal …
The adoption of security measures against cyber attacks has become a necessity for everyone in the current conditions. Applying and implementing these requirements in the …
Segmenting a picture means cutting it up into individual parts. One of the most challenging jobs in image processing, it has significant real-world implications. It has several …