首页 > 最新文献

International Journal of Electronics and Telecommunications最新文献

英文 中文
Optimized Supervised ML for Medicinal Plant Detection - An FPGA Implementation 药用植物检测的优化监督式 ML - FPGA 实现
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149576
Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi
Medicinal plants have a huge significance today as it is the root resource to treat several ailments and medical disorders that do not find a satisfactory cure using allopathy. The manual and physical identification of such plants requires experience and expertise and it can be a gradual and cumbersome task, in addition to resulting in inaccurate decisions. In an attempt to automate this decision making, a data set of leaves of 10 medicinal plant species were prepared and the Gray-level Co-occurence Matrix (GLCM) features were extracted. From our earlier implementations of the several machine learning algorithms, the k-nearest neighbor (KNN) algorithm was identified as best suited for classification using MATLAB 2019a and has been adopted here. Based on the confusion matrices for various k values, the optimum k was selected and the hardware implementation was implemented for the classifier on FPGA in this work. An accuracy of 88.3% was obtained for the classifier from the confusion chart. A custom intellectual property (IP) for the design is created and its verification is done on the ZedBoard for three classes of plants.
药用植物在当今具有巨大的意义,因为它是治疗异体疗法无法治愈的多种疾病和病症的根本资源。对这些植物进行人工和物理识别需要经验和专业知识,而且可能是一项渐进而繁琐的任务,此外还会导致决策不准确。为了实现自动决策,我们准备了 10 种药用植物叶片的数据集,并提取了灰度共轭矩阵(GLCM)特征。从我们之前对几种机器学习算法的实施情况来看,K-近邻(KNN)算法被认为是最适合使用 MATLAB 2019a 进行分类的算法,因此在此被采用。根据不同 k 值的混淆矩阵,我们选择了最佳 k 值,并在 FPGA 上对分类器进行了硬件实现。根据混淆图,分类器的准确率达到 88.3%。为该设计创建了自定义知识产权(IP),并在 ZedBoard 上对三类植物进行了验证。
{"title":"Optimized Supervised ML for Medicinal Plant Detection - An FPGA Implementation","authors":"Amrutha M. Raghukumar, Gayathri Narayanan, Somanathanm Geethu Remadevi","doi":"10.24425/ijet.2024.149576","DOIUrl":"https://doi.org/10.24425/ijet.2024.149576","url":null,"abstract":"Medicinal plants have a huge significance today as it is the root resource to treat several ailments and medical disorders that do not find a satisfactory cure using allopathy. The manual and physical identification of such plants requires experience and expertise and it can be a gradual and cumbersome task, in addition to resulting in inaccurate decisions. In an attempt to automate this decision making, a data set of leaves of 10 medicinal plant species were prepared and the Gray-level Co-occurence Matrix (GLCM) features were extracted. From our earlier implementations of the several machine learning algorithms, the k-nearest neighbor (KNN) algorithm was identified as best suited for classification using MATLAB 2019a and has been adopted here. Based on the confusion matrices for various k values, the optimum k was selected and the hardware implementation was implemented for the classifier on FPGA in this work. An accuracy of 88.3% was obtained for the classifier from the confusion chart. A custom intellectual property (IP) for the design is created and its verification is done on the ZedBoard for three classes of plants.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems 分析与大学信息和教育系统用户网络安全行为模式相关的数字足迹
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149596
V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura
The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.
与大学信息和教育系统(UIES)的网络安全(网络风险)用户行为有关的数字足迹(DF)分析涉及对系统中各方面活动的研究和评估。具体而言,此类分析包括研究访问大学信息和教育系统的典型模式(模式)、密码使用、网络活动、安全策略的遵守情况、异常行为的识别等。研究表明,用户在 UIES 中的行为是由操作序列表示的,可以使用序列分析方法进行分析。这种分析方法可使 UIES 的信息安全(IS)系统有效处理与用户行为序列模式相关的分类数据。分析表明,对具有网络威胁的用户行为的连续模式进行分析,可使 UIES IS 系统识别可能隐藏在行为链(而不仅仅是单个事件)中的更复杂的威胁。这样就能更有效地识别潜在威胁,防止用户和信息服务系统发生安全事件。
{"title":"Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems","authors":"V. Lakhno, Nurgazy Kurbaiyazov, Miroslav Lakhno, Olena Kryvoruchko, A. Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura","doi":"10.24425/ijet.2024.149596","DOIUrl":"https://doi.org/10.24425/ijet.2024.149596","url":null,"abstract":"The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves the study and evaluation of various aspects of activity in the systems. In particular, such analysis includes the study of typical patterns (patterns) of access to UIES, password usage, network activity, compliance with security policies, identification of anomalous behavior, and more. It is shown that user behavior in UIES is represented by sequences of actions and can be analyzed using the sequential analysis method. Such analysis will allow information security (IS) systems of UIES to efficiently process categorical data associated with sequential patterns of user actions. It is shown that analyzing sequential patterns of cyberthreatening user behavior will allow UIES IS systems to identify more complex threats that may be hidden in chains of actions, not just individual events. This will allow for more effective identification of potential threats and prevention of security incidents in the UIES.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complete synthesis of identity templates for quantum and reversible logic MCT circuits using SAT-solvers and proposal of suboptimality witness notion 利用 SAT 求解器完整合成量子和可逆逻辑 MCT 电路的标识模板,并提出次优性见证概念
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149602
Adam Jagielski
In this study, we introduce a procedural generation technique for Identity Templates applicable to quantum and reversible logic circuits. These templates are recognized for their significant role in enhancing the efficiency of quantum and reversible logic optimization. Our approach enables the exhaustive synthesis of all potential templates up to a specified size. Leveraging the power of SAT-solver technology, we have verified the comprehensiveness of our template collections by confirming the full exploration of the search space. Additionally, we propose an innovative concept of Suboptimality Witnesses, which we anticipate will be instrumental in streamlining the search process in formal methods, akin to SAT-solvers, for the synthesis of reversible logic circuits.
在本研究中,我们介绍了一种适用于量子和可逆逻辑电路的身份模板程序生成技术。这些模板因其在提高量子和可逆逻辑优化效率方面的重要作用而得到认可。我们的方法可以穷举合成指定大小的所有潜在模板。利用 SAT 求解器技术的强大功能,我们通过对搜索空间的充分探索,验证了模板集合的全面性。此外,我们还提出了 "次优性见证 "这一创新概念,预计它将有助于简化可逆逻辑电路合成的形式方法(类似于 SAT 求解器)的搜索过程。
{"title":"Complete synthesis of identity templates for quantum and reversible logic MCT circuits using SAT-solvers and proposal of suboptimality witness notion","authors":"Adam Jagielski","doi":"10.24425/ijet.2024.149602","DOIUrl":"https://doi.org/10.24425/ijet.2024.149602","url":null,"abstract":"In this study, we introduce a procedural generation technique for Identity Templates applicable to quantum and reversible logic circuits. These templates are recognized for their significant role in enhancing the efficiency of quantum and reversible logic optimization. Our approach enables the exhaustive synthesis of all potential templates up to a specified size. Leveraging the power of SAT-solver technology, we have verified the comprehensiveness of our template collections by confirming the full exploration of the search space. Additionally, we propose an innovative concept of Suboptimality Witnesses, which we anticipate will be instrumental in streamlining the search process in formal methods, akin to SAT-solvers, for the synthesis of reversible logic circuits.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating risk levels for blood pressure and thyroid hormone using artificial intelligence methods 利用人工智能方法估算血压和甲状腺激素的风险水平
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149595
Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy
In this work, artificial intelligence methods are designed and adopted for evaluating various risk levels of thyroid hormone and blood pressure in humans. Fuzzy Logic (FL) method is firstly exploited to provide the risk levels. Additionally, a machine learning was proposed using the Adaptive Neuron- Fuzzy Inference System (ANFIS) to learn and assess the risk levels by fusing a multiple-layer Neural Network (NN) with the FL. The data are collected for standard risk levels from real medical centers. The results lead to well ANFIS design based on the FL, which can generate such interesting outcomes for predicting risk levels for thyroid hormone and blood pressure. Both proposed methods of the FL and ANFIS can be exploited for medical applications.
在这项工作中,设计并采用了人工智能方法来评估人体甲状腺激素和血压的各种风险水平。首先利用模糊逻辑(FL)方法提供风险等级。此外,还提出了一种使用自适应神经元-模糊推理系统(ANFIS)的机器学习方法,通过将多层神经网络(NN)与模糊逻辑(FL)相融合来学习和评估风险水平。数据是从实际医疗中心收集的标准风险等级数据。结果表明,基于 FL 的 ANFIS 设计很好,可以产生预测甲状腺激素和血压风险水平的有趣结果。所提出的 FL 和 ANFIS 方法均可用于医疗应用。
{"title":"Estimating risk levels for blood pressure and thyroid hormone using artificial intelligence methods","authors":"Musab T. S. Al-Kaltakchi, R. Al-Nima, Azza Alhialy","doi":"10.24425/ijet.2024.149595","DOIUrl":"https://doi.org/10.24425/ijet.2024.149595","url":null,"abstract":"In this work, artificial intelligence methods are designed and adopted for evaluating various risk levels of thyroid hormone and blood pressure in humans. Fuzzy Logic (FL) method is firstly exploited to provide the risk levels. Additionally, a machine learning was proposed using the Adaptive Neuron- Fuzzy Inference System (ANFIS) to learn and assess the risk levels by fusing a multiple-layer Neural Network (NN) with the FL. The data are collected for standard risk levels from real medical centers. The results lead to well ANFIS design based on the FL, which can generate such interesting outcomes for predicting risk levels for thyroid hormone and blood pressure. Both proposed methods of the FL and ANFIS can be exploited for medical applications.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of focusing systems to the protection of information during data transmission in the zone of direct radio visibility 应用聚焦系统保护无线电直射区数据传输过程中的信息
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149599
Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov
It is shown that focusing systems built on the basis of a system of radio receivers spaced apart in space and simulating the operation of a lens can be used to ensure the protection of information during data transmission in the direct radio visibility zone. The synthesis of the lens equivalent in this case is carried out by using a system of phase shifters that change the phase of the oscillations arriving at each of the receivers, so that the receiving system is tuned to a radio wave source located at a specific point in space. In this case, information protection is provided according to the “friend or foe” principle, and any commands coming from other areas of space, except for the point where the authorized operator is located, are ignored. The advantage of this approach is the ability to partially or completely abandon the use of cryptographic methods. It is shown that the proposed approach is of considerable interest for ensuring the stable operation of groups of unmanned aerial vehicles from the point of view of the possibility of intercepting control using electronic warfare methods.
研究表明,以空间间隔的无线电接收器系统为基础,模拟透镜工作原理而建立的聚焦系统,可用于确保在无线电直接可见区进行数据传输时的信息保护。在这种情况下,透镜等效的合成是通过使用移相器系统来实现的,移相器系统可以改变到达每个接收器的振荡相位,从而使接收系统调谐到位于空间特定点的无线电波源。在这种情况下,根据 "非敌即友 "的原则提供信息保护,除了授权操作员所在的点之外,来自其他空间区域的任何指令都会被忽略。这种方法的优点是能够部分或完全放弃使用加密方法。研究表明,从使用电子战方法拦截控制的可能性的角度来看,所提议的方法对于确保无人驾驶飞行器群的稳定运行具有相当大的意义。
{"title":"Application of focusing systems to the protection of information during data transmission in the zone of direct radio visibility","authors":"Y. Vitulyova, K. Kadyrzhan, Aruzhan Kadyrzhan, I. Suleimenov","doi":"10.24425/ijet.2024.149599","DOIUrl":"https://doi.org/10.24425/ijet.2024.149599","url":null,"abstract":"It is shown that focusing systems built on the basis of a system of radio receivers spaced apart in space and simulating the operation of a lens can be used to ensure the protection of information during data transmission in the direct radio visibility zone. The synthesis of the lens equivalent in this case is carried out by using a system of phase shifters that change the phase of the oscillations arriving at each of the receivers, so that the receiving system is tuned to a radio wave source located at a specific point in space. In this case, information protection is provided according to the “friend or foe” principle, and any commands coming from other areas of space, except for the point where the authorized operator is located, are ignored. The advantage of this approach is the ability to partially or completely abandon the use of cryptographic methods. It is shown that the proposed approach is of considerable interest for ensuring the stable operation of groups of unmanned aerial vehicles from the point of view of the possibility of intercepting control using electronic warfare methods.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a system to analyse the performance of certified measuring instruments 设计一套系统来分析认证测量仪器的性能
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149590
Jacek Wójcik, M. Piasecka, Marzena Mięsikowska
The aim of this article is to present modern methods for analysing the performance of certified measuring instruments. The design of a system for analysing the performance of certified measuring instruments is presented. In the first part, the traditional process of certification of measuring instruments and methods of market surveillance are described. The other part proposes an electronic solution to support the certification process by supervising the correct operation of measuring instruments.
本文旨在介绍分析认证测量仪器性能的现代方法。文章介绍了认证计量器具性能分析系统的设计。第一部分介绍了计量器具认证的传统程序和市场监督方法。另一部分提出了一种电子解决方案,通过监督测量仪器的正确操作来支持认证过程。
{"title":"Design of a system to analyse the performance of certified measuring instruments","authors":"Jacek Wójcik, M. Piasecka, Marzena Mięsikowska","doi":"10.24425/ijet.2024.149590","DOIUrl":"https://doi.org/10.24425/ijet.2024.149590","url":null,"abstract":"The aim of this article is to present modern methods for analysing the performance of certified measuring instruments. The design of a system for analysing the performance of certified measuring instruments is presented. In the first part, the traditional process of certification of measuring instruments and methods of market surveillance are described. The other part proposes an electronic solution to support the certification process by supervising the correct operation of measuring instruments.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141805854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information technologies in higher education teaching in the opinions of academic teachers 学术教师眼中的高等教育教学信息技术
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149608
M. W. Romaniuk, J. Łukasiewicz-Wieleba
The article analyzes the opinions of academic teachers on the use of information technologies (ICT) in higher education teaching. Key conclusions from the study indicate the need to ensure a stable Internet connection and access to functional computer equipment and projectors in each classroom. Teachers emphasize the importance of financing the software and its systematic updating. The university's technical support is also important, including quick response to problems and the availability of the technical department. The respondents point out the need to increase the number of training courses on new tools and AI, which will allow for better adaptation to the needs of students. They also point to the need to equip classrooms with equipment for hybrid classes and support students by providing them with laptops and specialized software.
文章分析了学术教师对在高等教育教学中使用信息技术(ICT)的看法。研究的主要结论表明,有必要确保每个教室都有稳定的互联网连接,并能使用功能齐全的计算机设备和投影仪。教师们强调了资助软件及其系统更新的重要性。大学的技术支持也很重要,包括对问题的快速反应和技术部门的可用性。受访者指出,需要增加新工具和人工智能培训课程的数量,以便更好地适应学生的需 要。他们还指出,有必要为混合课堂的教室配备设备,并为学生提供笔记本电脑和专用软件。
{"title":"Information technologies in higher education teaching in the opinions of academic teachers","authors":"M. W. Romaniuk, J. Łukasiewicz-Wieleba","doi":"10.24425/ijet.2024.149608","DOIUrl":"https://doi.org/10.24425/ijet.2024.149608","url":null,"abstract":"The article analyzes the opinions of academic teachers on the use of information technologies (ICT) in higher education teaching. Key conclusions from the study indicate the need to ensure a stable Internet connection and access to functional computer equipment and projectors in each classroom. Teachers emphasize the importance of financing the software and its systematic updating. The university's technical support is also important, including quick response to problems and the availability of the technical department. The respondents point out the need to increase the number of training courses on new tools and AI, which will allow for better adaptation to the needs of students. They also point to the need to equip classrooms with equipment for hybrid classes and support students by providing them with laptops and specialized software.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowd noise spectra for the calculation of the speech transmission index for public address systems 用于计算公共广播系统语音传输指数的人群噪声频谱
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149586
P. Dziechciński
Knowledge of interfering noise is necessary for the correct design of a public address system. Noise sound levels can be obtained, for example, from BS 5389-1. It is more difficult to acquire knowledge of the interfering noise spectra, and the spectrum is also important for calculating speech intelligibility. As shown in the paper, for crowd noise, it is possible to determine the spectrum by pairing the level of noise to the speech spectrum for appropriate vocal effort. The error in determining the speech transmission index for public address systems for such selected noise spectra, relative to values for measurement-acquired noise spectra, is acceptable.
要正确设计公共广播系统,就必须了解干扰噪声。噪声声级可以从 BS 5389-1 等标准中获得。获取干扰噪声频谱的知识则较为困难,而频谱对于计算语音清晰度也很重要。如本文所示,对于人群噪声,可以通过将噪声水平与适当发声力度的语音频谱配对来确定频谱。在确定公共广播系统的语音传输指数时,这种选定噪声频谱的误差相对于测量获得的噪声频谱值是可以接受的。
{"title":"Crowd noise spectra for the calculation of the speech transmission index for public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149586","DOIUrl":"https://doi.org/10.24425/ijet.2024.149586","url":null,"abstract":"Knowledge of interfering noise is necessary for the correct design of a public address system. Noise sound levels can be obtained, for example, from BS 5389-1. It is more difficult to acquire knowledge of the interfering noise spectra, and the spectrum is also important for calculating speech intelligibility. As shown in the paper, for crowd noise, it is possible to determine the spectrum by pairing the level of noise to the speech spectrum for appropriate vocal effort. The error in determining the speech transmission index for public address systems for such selected noise spectra, relative to values for measurement-acquired noise spectra, is acceptable.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Origin and properties of own error signals of the discrete wavelet transform algorithms 离散小波变换算法自身误差信号的起源和特性
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149591
Łukasz Dróżdż, Jerzy Roj
The article presents a method for analyzing the own errors of the discrete wavelet transform algorithms, which are introduced by these algorithms into the output quantities. The presented considerations include determining the origin of the error signals in question and determining their parameters. Both errors resulting from imperfections in the transmittance of the algorithm and those resulting from its implementation in the actual measurement chain were considered.
文章介绍了一种分析离散小波变换算法自身误差的方法,这些误差是由这些算法引入输出量中的。本文提出的考虑因素包括确定相关误差信号的来源及其参数。既考虑了算法透射率不完善造成的误差,也考虑了算法在实际测量链中的执行造成的误差。
{"title":"Origin and properties of own error signals of the discrete wavelet transform algorithms","authors":"Łukasz Dróżdż, Jerzy Roj","doi":"10.24425/ijet.2024.149591","DOIUrl":"https://doi.org/10.24425/ijet.2024.149591","url":null,"abstract":"The article presents a method for analyzing the own errors of the discrete wavelet transform algorithms, which are introduced by these algorithms into the output quantities. The presented considerations include determining the origin of the error signals in question and determining their parameters. Both errors resulting from imperfections in the transmittance of the algorithm and those resulting from its implementation in the actual measurement chain were considered.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise spectra for calculation the speech transmission index in public address systems 用于计算公共广播系统语音传输指数的噪声频谱
IF 0.5 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-25 DOI: 10.24425/ijet.2024.149578
P. Dziechciński
To precision calculate the speech transmission index (STI), it is necessary to know the level and spectrum of the interfering noise. Simplified design methods used in public address systems are limited to obtaining an appropriate signal-to-noise ratio based on A weighted sound levels. For this reason, among others, guidelines for designers usually contain information on typical interfering noise levels and do not provide information on the noise spectrum. As shown in the paper, the effect of the noise spectrum on STI can be very high, and when such spectrum cannot be obtained by measurement or computation, standardised spectra appropriate for a given type of noise can be used for STI calculations.
要精确计算语音传输指数 (STI),就必须知道干扰噪声的电平和频谱。公共广播系统中使用的简化设计方法仅限于根据 A 加权声级获得适当的信噪比。因此,除其他原因外,设计人员指南通常只包含典型干扰噪声电平的信息,而不提供噪声频谱的信息。如本文所示,噪声频谱对 STI 的影响可能非常大,当无法通过测量或计算获得此类频谱时,可使用适合特定类型噪声的标准化频谱来计算 STI。
{"title":"Noise spectra for calculation the speech transmission index in public address systems","authors":"P. Dziechciński","doi":"10.24425/ijet.2024.149578","DOIUrl":"https://doi.org/10.24425/ijet.2024.149578","url":null,"abstract":"To precision calculate the speech transmission index (STI), it is necessary to know the level and spectrum of the interfering noise. Simplified design methods used in public address systems are limited to obtaining an appropriate signal-to-noise ratio based on A weighted sound levels. For this reason, among others, guidelines for designers usually contain information on typical interfering noise levels and do not provide information on the noise spectrum. As shown in the paper, the effect of the noise spectrum on STI can be very high, and when such spectrum cannot be obtained by measurement or computation, standardised spectra appropriate for a given type of noise can be used for STI calculations.","PeriodicalId":13922,"journal":{"name":"International Journal of Electronics and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Electronics and Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1