首页 > 最新文献

Int. J. Knowl. Based Intell. Eng. Syst.最新文献

英文 中文
Rigorous assessment of data mining algorithms in gestational diabetes mellitus prediction 数据挖掘算法在妊娠期糖尿病预测中的严谨评估
Pub Date : 2022-02-18 DOI: 10.3233/kes-210081
S. Reddy, Nilambar Sethi, R. Rajender
Gestational diabetes mellitus (GDM) is the type of diabetes that affects pregnant women due to high blood sugar levels. The women with gestational diabetes have a chance of miscarriage during pregnancy and having chance of developing type-2 diabetes in the future. It is a general practice to take proper diabetes test like OGTT to detect GDM. This test is to be done during 24 to 28 weeks of pregnancy. In addition, the use of machine learning could be exploited for predicting gestational diabetes. The main goal of this work is to propose optimal ML algorithms for effective prediction of gestational diabetes mellitus and there by avoid it’s side effects and future complications. In this work different machine algorithms are planned to be compared for their performance in predicting GDM. Before analysing the algorithms they are implemented using 10 fold cross validation technique to obtain better performance. The algorithms implemented are Linear Discriminant Analysis, Mixture Discriminant Analysis, Quadratic Discriminant Analysis, Flexible Discriminant Analysis, Regularized Discriminant Analysis and Feed Forward Neural Networks. These algorithms are compared depending on performance measures accuracy, kappa statistic, sensitivity, specificity, precision and F-measure. Then feed forward neural networks and Flexible Discriminant Analysis are obtained as optimal in this work.
妊娠期糖尿病(GDM)是一种由于高血糖水平而影响孕妇的糖尿病。患有妊娠期糖尿病的妇女在怀孕期间有可能流产,并有可能在未来发展为2型糖尿病。一般做法是采取适当的糖尿病试验如OGTT来检测GDM。该测试应在怀孕24至28周期间进行。此外,机器学习的使用可以用于预测妊娠糖尿病。本工作的主要目的是提出最优的ML算法来有效预测妊娠期糖尿病,从而避免其副作用和未来的并发症。在这项工作中,计划比较不同的机器算法在预测GDM方面的性能。在分析算法之前,它们使用10倍交叉验证技术实现,以获得更好的性能。实现的算法有线性判别分析、混合判别分析、二次判别分析、柔性判别分析、正则化判别分析和前馈神经网络。根据性能指标的准确性、kappa统计量、灵敏度、特异性、精密度和F-measure对这些算法进行了比较。在此基础上得到了前馈神经网络和柔性判别分析的最优解。
{"title":"Rigorous assessment of data mining algorithms in gestational diabetes mellitus prediction","authors":"S. Reddy, Nilambar Sethi, R. Rajender","doi":"10.3233/kes-210081","DOIUrl":"https://doi.org/10.3233/kes-210081","url":null,"abstract":"Gestational diabetes mellitus (GDM) is the type of diabetes that affects pregnant women due to high blood sugar levels. The women with gestational diabetes have a chance of miscarriage during pregnancy and having chance of developing type-2 diabetes in the future. It is a general practice to take proper diabetes test like OGTT to detect GDM. This test is to be done during 24 to 28 weeks of pregnancy. In addition, the use of machine learning could be exploited for predicting gestational diabetes. The main goal of this work is to propose optimal ML algorithms for effective prediction of gestational diabetes mellitus and there by avoid it’s side effects and future complications. In this work different machine algorithms are planned to be compared for their performance in predicting GDM. Before analysing the algorithms they are implemented using 10 fold cross validation technique to obtain better performance. The algorithms implemented are Linear Discriminant Analysis, Mixture Discriminant Analysis, Quadratic Discriminant Analysis, Flexible Discriminant Analysis, Regularized Discriminant Analysis and Feed Forward Neural Networks. These algorithms are compared depending on performance measures accuracy, kappa statistic, sensitivity, specificity, precision and F-measure. Then feed forward neural networks and Flexible Discriminant Analysis are obtained as optimal in this work.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for multiple attribute decision making with dual hesitant Pythagorean fuzzy information and their application to supplier selection 双犹豫毕达哥拉斯模糊信息下的多属性决策算法及其在供应商选择中的应用
Pub Date : 2022-02-18 DOI: 10.3233/kes-210089
Xuyang Li
In this paper, we investigate the multiple attribute decision making (MADM) problem based on the Hamacher aggregation operators and Choquet integral with dual Pythagorean hesitant fuzzy information. Then, motivated by the ideal of Hamacher operation and Choquet integral, we have developed some Hamacher correlated operators for aggregating dual hesitant Pythagorean fuzzy information. The prominent characteristic of these proposed operators is studied. Then, we have utilized these two operators to develop some approaches to solve the dual hesitant Pythagorean fuzzy MADM problems. Finally, a practical example for supplier selection in supply chain management is given to verify the developed approach and to demonstrate its practicality and effectiveness.
研究了具有对偶毕达哥拉斯犹豫模糊信息的基于Hamacher聚集算子和Choquet积分的多属性决策问题。然后,在Hamacher运算和Choquet积分理想的激励下,我们发展了一些用于聚合对偶犹豫毕达哥拉斯模糊信息的Hamacher相关算子。研究了这些算子的显著特性。然后,我们利用这两个算子发展了一些解决对偶犹豫毕达哥拉斯模糊MADM问题的方法。最后,以供应链管理中的供应商选择为例,验证了该方法的实用性和有效性。
{"title":"Algorithms for multiple attribute decision making with dual hesitant Pythagorean fuzzy information and their application to supplier selection","authors":"Xuyang Li","doi":"10.3233/kes-210089","DOIUrl":"https://doi.org/10.3233/kes-210089","url":null,"abstract":"In this paper, we investigate the multiple attribute decision making (MADM) problem based on the Hamacher aggregation operators and Choquet integral with dual Pythagorean hesitant fuzzy information. Then, motivated by the ideal of Hamacher operation and Choquet integral, we have developed some Hamacher correlated operators for aggregating dual hesitant Pythagorean fuzzy information. The prominent characteristic of these proposed operators is studied. Then, we have utilized these two operators to develop some approaches to solve the dual hesitant Pythagorean fuzzy MADM problems. Finally, a practical example for supplier selection in supply chain management is given to verify the developed approach and to demonstrate its practicality and effectiveness.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models for multiple attribute decision making with dual hesitant pythagorean fuzzy information 具有双犹豫毕达哥拉斯模糊信息的多属性决策模型
Pub Date : 2022-02-18 DOI: 10.3233/kes-210085
Linggang Ran
In this paper, we investigate the multiple attribute decision making (MADM) problem based on the Muirhead Mean (MM) operators with dual Pythagorean hesitant fuzzy information. Then, motivated by the ideal of MM operators, we have developed some MM operators for aggregating dual hesitant Pythagorean fuzzy information. The prominent characteristic of these proposed operators are studied. Then, we have utilized these operators to develop some approaches to solve the dual hesitant Pythagorean fuzzy multiple attribute decision making problems. Finally, a practical example for supplier selection in supply chain management is given to verify the developed approach and to demonstrate its practicality and effectiveness.
本文研究了具有双毕达哥拉斯犹豫模糊信息的基于Muirhead均值算子的多属性决策问题。然后,在MM算子理想的激励下,我们开发了一些用于聚合对偶犹豫毕达哥拉斯模糊信息的MM算子。研究了这些算子的显著特性。然后,我们利用这些算子开发了一些方法来解决对偶犹豫毕达哥拉斯模糊多属性决策问题。最后,以供应链管理中的供应商选择为例,验证了该方法的实用性和有效性。
{"title":"Models for multiple attribute decision making with dual hesitant pythagorean fuzzy information","authors":"Linggang Ran","doi":"10.3233/kes-210085","DOIUrl":"https://doi.org/10.3233/kes-210085","url":null,"abstract":"In this paper, we investigate the multiple attribute decision making (MADM) problem based on the Muirhead Mean (MM) operators with dual Pythagorean hesitant fuzzy information. Then, motivated by the ideal of MM operators, we have developed some MM operators for aggregating dual hesitant Pythagorean fuzzy information. The prominent characteristic of these proposed operators are studied. Then, we have utilized these operators to develop some approaches to solve the dual hesitant Pythagorean fuzzy multiple attribute decision making problems. Finally, a practical example for supplier selection in supply chain management is given to verify the developed approach and to demonstrate its practicality and effectiveness.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the fire safety assessment of high building with intuitionistic fuzzy TOPSIS method 基于直觉模糊TOPSIS法的高层建筑消防安全评价研究
Pub Date : 2022-02-18 DOI: 10.3233/kes-210084
Mingbiao Xu, Dehong Peng
In our country, fire from high-rise buildings happens from time to time and produced economic loss could be well over 100 billion that will give rise to great harm to safety of the people’s life and property even to the development of the whole national economy. In the fire protection work for High-rise building’s safety assessment, prevention, cause and salvation, all of this controlled by multiple factors. With their different attributes, fire problem and management work became more complex and even harder. When we want to integration and judgment the information which including many main bodies that with multi-aspect and evaluation index characteristics to be evaluated, Fuzzy mathematics evaluation method can help us. It can consider fully the fuzzy and uncertain in the assessment. For the problems in high-rise Building fire protection management. And it is frequently viewed as a multi-attribute group decision-making (MAGDM) issue. Thus, a novel MAGDM method is needed to tackle it. Depending on the conventional TOPSIS (Technique for Order Preferenceby Similarity to Ideal Solution) method and intuitionistic fuzzy sets (IFSs), this essay designs a novel intuitive distance based IF-TOPSIS method for fire safety assessment based on the high building. Afterwards, relying on novel distance measures between IFNs, the conventional TOPSIS method is extended to the intuitionistic fuzzy environment to calculate assessment score of each alternative. Eventually, an application about fire safety assessment based on the high building and some comparative analysis have been given to demonstrate the superiority of the designed method. The results illustrate that the designed framework is useful for fire safety assessment based on the high building.
在我国,高层建筑火灾时有发生,造成的经济损失可达千亿以上,对人民生命财产安全乃至整个国民经济的发展造成极大危害。在消防工作中对高层建筑的安全评价、预防、致因和抢救,这一切都受多重因素的控制。由于其不同的属性,火灾问题和管理工作变得更加复杂和困难。当我们需要对包含许多具有多方位和评价指标特征的主体信息进行综合评判时,模糊数学评价方法可以为我们提供帮助。它能充分考虑评价中的模糊性和不确定性。针对高层建筑消防管理中存在的问题。它经常被看作是一个多属性群体决策问题。因此,需要一种新的MAGDM方法来解决这一问题。本文在传统的TOPSIS (Order preference Technique for Order Preferenceby Similarity to Ideal Solution)方法和直觉模糊集(ifs)方法的基础上,设计了一种基于直觉距离的高层建筑消防安全评价的IF-TOPSIS方法。然后,依靠新的ifn之间的距离度量,将传统的TOPSIS方法扩展到直觉模糊环境中,计算每个备选方案的评价分数。最后,以某高层建筑为例进行了消防安全评价,并进行了对比分析,证明了所设计方法的优越性。结果表明,所设计的框架可用于高层建筑的消防安全评价。
{"title":"Research on the fire safety assessment of high building with intuitionistic fuzzy TOPSIS method","authors":"Mingbiao Xu, Dehong Peng","doi":"10.3233/kes-210084","DOIUrl":"https://doi.org/10.3233/kes-210084","url":null,"abstract":"In our country, fire from high-rise buildings happens from time to time and produced economic loss could be well over 100 billion that will give rise to great harm to safety of the people’s life and property even to the development of the whole national economy. In the fire protection work for High-rise building’s safety assessment, prevention, cause and salvation, all of this controlled by multiple factors. With their different attributes, fire problem and management work became more complex and even harder. When we want to integration and judgment the information which including many main bodies that with multi-aspect and evaluation index characteristics to be evaluated, Fuzzy mathematics evaluation method can help us. It can consider fully the fuzzy and uncertain in the assessment. For the problems in high-rise Building fire protection management. And it is frequently viewed as a multi-attribute group decision-making (MAGDM) issue. Thus, a novel MAGDM method is needed to tackle it. Depending on the conventional TOPSIS (Technique for Order Preferenceby Similarity to Ideal Solution) method and intuitionistic fuzzy sets (IFSs), this essay designs a novel intuitive distance based IF-TOPSIS method for fire safety assessment based on the high building. Afterwards, relying on novel distance measures between IFNs, the conventional TOPSIS method is extended to the intuitionistic fuzzy environment to calculate assessment score of each alternative. Eventually, an application about fire safety assessment based on the high building and some comparative analysis have been given to demonstrate the superiority of the designed method. The results illustrate that the designed framework is useful for fire safety assessment based on the high building.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multimodal biometric identification system with deep learning based feature level fusion using maximum orthogonal method 基于最大正交法的深度学习特征融合多模态生物识别系统
Pub Date : 2022-02-18 DOI: 10.3233/kes-210086
P. Shende, Y. Dandawate
Multimodal Biometrics are used to developed the robust system for Identification. Biometric such as face, fingerprint and palm vein are used for security purposes. In this Proposed System, Convolutional neural network is used for recognizing the image features. Convolutional neural networks are complex feed forward neural networks used for image classification and recognition due to its high accuracy rate. Convolutional neural network extracts the features of face, fingerprint and palm vein. Feature level fusion is done at Rectified linear unit layer. Maximum orthogonal component method is used for Fusion. In Maximum orthogonal component method, prominent features of biometrics are considered and fused together. This method helps to improve the recognition rates. Database are self-generated using these biometrics. Training and Testing is done using 4500 images of face, fingerprint and palm vein. Performance parameters are improved by this technique. The experimental results are better than conventional methods.
采用多模态生物识别技术开发了鲁棒的识别系统。面部、指纹和手掌静脉等生物特征被用于安全目的。在该系统中,使用卷积神经网络对图像特征进行识别。卷积神经网络是一种复杂的前馈神经网络,以其较高的准确率用于图像分类和识别。卷积神经网络提取人脸特征、指纹特征和掌纹特征。特征级融合在整流线性单元层完成。采用最大正交分量法进行融合。在最大正交分量法中,考虑并融合了生物特征的显著特征。该方法有助于提高图像的识别率。数据库是使用这些生物识别技术自行生成的。训练和测试使用4500张人脸、指纹和手掌静脉图像完成。该技术提高了性能参数。实验结果优于常规方法。
{"title":"Multimodal biometric identification system with deep learning based feature level fusion using maximum orthogonal method","authors":"P. Shende, Y. Dandawate","doi":"10.3233/kes-210086","DOIUrl":"https://doi.org/10.3233/kes-210086","url":null,"abstract":"Multimodal Biometrics are used to developed the robust system for Identification. Biometric such as face, fingerprint and palm vein are used for security purposes. In this Proposed System, Convolutional neural network is used for recognizing the image features. Convolutional neural networks are complex feed forward neural networks used for image classification and recognition due to its high accuracy rate. Convolutional neural network extracts the features of face, fingerprint and palm vein. Feature level fusion is done at Rectified linear unit layer. Maximum orthogonal component method is used for Fusion. In Maximum orthogonal component method, prominent features of biometrics are considered and fused together. This method helps to improve the recognition rates. Database are self-generated using these biometrics. Training and Testing is done using 4500 images of face, fingerprint and palm vein. Performance parameters are improved by this technique. The experimental results are better than conventional methods.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient and precise dynamic slicing for concurrent component-oriented programs 面向并发组件程序的高效精确动态切片
Pub Date : 2022-02-18 DOI: 10.3233/kes-210088
N. Pujari, Abhishek Ray, Jagannath Singh
A dynamic slicing algorithm is proposed in this paper along with its implementation which is dynamic for concurrent Component-oriented programs carrying multiple threads. As a part of representing the concurrent COP (CCOP) effectively, an intermediate graph is developed called Concurrent Component Dependency Graph (CCmDG). The system dependence graph (SDG) for individual components and interfaces are integrated to represent the above intermediate graph. It also consists of some new dependence edges which have been triggered for connecting the individual dependence graph of each component with the interface. Based on the graph created for the CCOP, a dynamic slicing algorithm is proposed, which sets the resultant by making the executed nodes marked during run time in Concurrent Components Dynamic Slicing (CCmDS) appropriately. For checking the competence of our algorithm, five case studies have been considered and also compared with an existing technique. From the study, we found that our algorithm results in smaller and precise size slice compared to the existing algorithm in less time.
本文提出了一种动态切片算法,并给出了实现方法。为了有效地表示并发组件依赖图(CCmDG),开发了一个中间图,称为并发组件依赖图(CCmDG)。将各个组件和接口的系统依赖图(SDG)集成以表示上述中间图。它还包括一些新的依赖边,这些依赖边被触发用于将每个组件的独立依赖图与接口连接起来。在构建并行组件动态切片图的基础上,提出了一种动态切片算法,该算法通过在并行组件动态切片(CCmDS)中对运行时执行的节点进行适当标记来设置结果。为了验证我们的算法的能力,我们考虑了五个案例,并与现有的技术进行了比较。从研究中我们发现,与现有算法相比,我们的算法在更短的时间内得到了更小、更精确的尺寸切片。
{"title":"An efficient and precise dynamic slicing for concurrent component-oriented programs","authors":"N. Pujari, Abhishek Ray, Jagannath Singh","doi":"10.3233/kes-210088","DOIUrl":"https://doi.org/10.3233/kes-210088","url":null,"abstract":"A dynamic slicing algorithm is proposed in this paper along with its implementation which is dynamic for concurrent Component-oriented programs carrying multiple threads. As a part of representing the concurrent COP (CCOP) effectively, an intermediate graph is developed called Concurrent Component Dependency Graph (CCmDG). The system dependence graph (SDG) for individual components and interfaces are integrated to represent the above intermediate graph. It also consists of some new dependence edges which have been triggered for connecting the individual dependence graph of each component with the interface. Based on the graph created for the CCOP, a dynamic slicing algorithm is proposed, which sets the resultant by making the executed nodes marked during run time in Concurrent Components Dynamic Slicing (CCmDS) appropriately. For checking the competence of our algorithm, five case studies have been considered and also compared with an existing technique. From the study, we found that our algorithm results in smaller and precise size slice compared to the existing algorithm in less time.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic analysis of identity based encryption (IBE) 基于身份的加密(IBE)系统分析
Pub Date : 2021-11-15 DOI: 10.3233/kes-210078
Aravind Karrothu, J. Norman
Light-weight cryptography is a major research area due to the minimization of the size of the devices utilized for such services. The associated security threats do increase as their applications are more now. Identity-Based Encryption (IBE) with its wide range of cryptographic schemes and protocols is specifically found suitable for low-end devices that have much resource constraint. This work describes various schemes and protocols in IBE. In this paper an analysis of IBE schemes and the various attacks they are prone to are discussed. The future trends are found to be very promising and challenging.
由于用于此类服务的设备尺寸最小化,轻量级密码学是一个主要的研究领域。随着它们的应用程序越来越多,相关的安全威胁也在增加。基于身份的加密(IBE)具有广泛的加密方案和协议,特别适合于资源受限的低端设备。本文描述了IBE中的各种方案和协议。本文对IBE方案进行了分析,并讨论了它们容易受到的各种攻击。未来的趋势是非常有希望和挑战性的。
{"title":"A systematic analysis of identity based encryption (IBE)","authors":"Aravind Karrothu, J. Norman","doi":"10.3233/kes-210078","DOIUrl":"https://doi.org/10.3233/kes-210078","url":null,"abstract":"Light-weight cryptography is a major research area due to the minimization of the size of the devices utilized for such services. The associated security threats do increase as their applications are more now. Identity-Based Encryption (IBE) with its wide range of cryptographic schemes and protocols is specifically found suitable for low-end devices that have much resource constraint. This work describes various schemes and protocols in IBE. In this paper an analysis of IBE schemes and the various attacks they are prone to are discussed. The future trends are found to be very promising and challenging.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine hearing system for teleconference authentication with effective speech analysis 具有有效语音分析的电话会议认证机器听力系统
Pub Date : 2021-11-10 DOI: 10.3233/kes-210079
T. Madhusudhana Rao, Suribabu Korada, Yarramalle Srinivas
The speaker identification in Teleconferencing scenario, it is important to address whether a particular speaker is a part of a conference or not and to note that whether a particular speaker is spoken at the meeting or not. The feature vectors are extracted using MFCC-SDC-LPC. The Generalized Gamma Distribution is used to model the feature vectors. K-means algorithm is utilized to cluster the speech data. The test speaker is to be verified that he/she is a participant in the conference. A conference database is generated with 50 speakers. In order to test the model, 20 different speakers not belonging to the conference are also considered. The efficiency of the model developed is compared using various measures such as AR, FAR and MDR. And the system is tested by varying number of speakers in the conference. The results show that the model performs more robustly.
在电话会议场景中的发言人识别,重要的是要解决特定的发言人是否是会议的一部分,并注意特定的发言人是否在会议上发言。使用MFCC-SDC-LPC提取特征向量。采用广义伽玛分布对特征向量进行建模。采用K-means算法对语音数据进行聚类。测试发言人需要确认他/她是会议的参与者。生成一个会议数据库,其中有50名发言者。为了测试模型,还考虑了20个不属于会议的不同演讲者。采用AR、FAR和MDR等多种指标对所开发模型的效率进行了比较。该系统通过会议上不同数量的演讲者进行测试。结果表明,该模型具有较好的鲁棒性。
{"title":"Machine hearing system for teleconference authentication with effective speech analysis","authors":"T. Madhusudhana Rao, Suribabu Korada, Yarramalle Srinivas","doi":"10.3233/kes-210079","DOIUrl":"https://doi.org/10.3233/kes-210079","url":null,"abstract":"The speaker identification in Teleconferencing scenario, it is important to address whether a particular speaker is a part of a conference or not and to note that whether a particular speaker is spoken at the meeting or not. The feature vectors are extracted using MFCC-SDC-LPC. The Generalized Gamma Distribution is used to model the feature vectors. K-means algorithm is utilized to cluster the speech data. The test speaker is to be verified that he/she is a participant in the conference. A conference database is generated with 50 speakers. In order to test the model, 20 different speakers not belonging to the conference are also considered. The efficiency of the model developed is compared using various measures such as AR, FAR and MDR. And the system is tested by varying number of speakers in the conference. The results show that the model performs more robustly.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A variant of SWEMDH technique based on variational mode decomposition for speech enhancement 一种基于变分模态分解的语音增强SWEMDH技术
Pub Date : 2021-11-10 DOI: 10.3233/kes-210072
P. Selvaraj, E. Chandra
In Speech Enhancement (SE) techniques, the major challenging task is to suppress non-stationary noises including white noise in real-time application scenarios. Many techniques have been developed for enhancing the vocal signals; however, those were not effective for suppressing non-stationary noises very well. Also, those have high time and resource consumption. As a result, Sliding Window Empirical Mode Decomposition and Hurst (SWEMDH)-based SE method where the speech signal was decomposed into Intrinsic Mode Functions (IMFs) based on the sliding window and the noise factor in each IMF was chosen based on the Hurst exponent data. Also, the least corrupted IMFs were utilized to restore the vocal signal. However, this technique was not suitable for white noise scenarios. Therefore in this paper, a Variant of Variational Mode Decomposition (VVMD) with SWEMDH technique is proposed to reduce the complexity in real-time applications. The key objective of this proposed SWEMD-VVMDH technique is to decide the IMFs based on Hurst exponent and then apply the VVMD technique to suppress both low- and high-frequency noisy factors from the vocal signals. Originally, the noisy vocal signal is decomposed into many IMFs using SWEMDH technique. Then, Hurst exponent is computed to decide the IMFs with low-frequency noisy factors and Narrow-Band Components (NBC) is computed to decide the IMFs with high-frequency noisy factors. Moreover, VVMD is applied on the addition of all chosen IMF to remove both low- and high-frequency noisy factors. Thus, the speech signal quality is improved under non-stationary noises including additive white Gaussian noise. Finally, the experimental outcomes demonstrate the significant speech signal improvement under both non-stationary and white noise surroundings.
在语音增强技术中,在实时应用场景中抑制非平稳噪声(包括白噪声)是一项具有挑战性的任务。许多增强声音信号的技术已经被开发出来;然而,这些方法在抑制非平稳噪声方面效果不佳。而且,这些都有很高的时间和资源消耗。因此,基于滑动窗口经验模态分解和Hurst (SWEMDH)的SE方法,将语音信号基于滑动窗口分解为内禀模态函数(IMFs),并根据Hurst指数数据选择每个IMF中的噪声因子。同时,利用最小的干扰分量来恢复语音信号。然而,这种技术不适合白噪声场景。为此,本文提出了一种基于SWEMDH技术的变分模态分解(VVMD)方法,以降低实时应用中的复杂度。提出的SWEMD-VVMDH技术的关键目标是基于Hurst指数确定imf,然后应用VVMD技术抑制声音信号中的低频和高频噪声因素。最初,使用SWEMDH技术将噪声语音信号分解为多个imf。然后,计算Hurst指数来确定低频噪声因素的imf,计算窄带分量(NBC)来确定高频噪声因素的imf。此外,VVMD应用于所有选定的IMF的加法,以去除低频和高频噪声因素。因此,在非平稳噪声(包括加性高斯白噪声)下,语音信号质量得到了改善。最后,实验结果表明,在非平稳和白噪声环境下,语音信号都得到了显著改善。
{"title":"A variant of SWEMDH technique based on variational mode decomposition for speech enhancement","authors":"P. Selvaraj, E. Chandra","doi":"10.3233/kes-210072","DOIUrl":"https://doi.org/10.3233/kes-210072","url":null,"abstract":"In Speech Enhancement (SE) techniques, the major challenging task is to suppress non-stationary noises including white noise in real-time application scenarios. Many techniques have been developed for enhancing the vocal signals; however, those were not effective for suppressing non-stationary noises very well. Also, those have high time and resource consumption. As a result, Sliding Window Empirical Mode Decomposition and Hurst (SWEMDH)-based SE method where the speech signal was decomposed into Intrinsic Mode Functions (IMFs) based on the sliding window and the noise factor in each IMF was chosen based on the Hurst exponent data. Also, the least corrupted IMFs were utilized to restore the vocal signal. However, this technique was not suitable for white noise scenarios. Therefore in this paper, a Variant of Variational Mode Decomposition (VVMD) with SWEMDH technique is proposed to reduce the complexity in real-time applications. The key objective of this proposed SWEMD-VVMDH technique is to decide the IMFs based on Hurst exponent and then apply the VVMD technique to suppress both low- and high-frequency noisy factors from the vocal signals. Originally, the noisy vocal signal is decomposed into many IMFs using SWEMDH technique. Then, Hurst exponent is computed to decide the IMFs with low-frequency noisy factors and Narrow-Band Components (NBC) is computed to decide the IMFs with high-frequency noisy factors. Moreover, VVMD is applied on the addition of all chosen IMF to remove both low- and high-frequency noisy factors. Thus, the speech signal quality is improved under non-stationary noises including additive white Gaussian noise. Finally, the experimental outcomes demonstrate the significant speech signal improvement under both non-stationary and white noise surroundings.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speaker identification analysis for SGMM with k-means and fuzzy C-means clustering using SVM statistical technique 基于支持向量机统计技术的k-均值和模糊c -均值聚类的SGMM说话人识别分析
Pub Date : 2021-11-10 DOI: 10.3233/kes-210073
K. Manikandan, E. Chandra
Speaker Identification denotes the speech samples of known speaker and it identifies the best matches of the input model. The SGMFC method is the combination of Sub Gaussian Mixture Model (SGMM) with the Mel-frequency Cepstral Coefficients (MFCC) for feature extraction. The SGMFC method minimizes the error rate, memory footprint and also computational throughput measure needs of a medium-vocabulary speaker identification system, supposed for preparation on a transportable or otherwise. Fuzzy C-means and k-means clustering are used in the SGMM method to attain the improved efficiency and their outcomes with parameters such as precision, sensitivity and specificity are compared.
说话人识别表示已知说话人的语音样本,并识别输入模型的最佳匹配。SGMFC方法是将亚高斯混合模型(SGMM)与mel频率倒谱系数(MFCC)相结合进行特征提取。SGMFC方法最大限度地降低了中等词汇量说话人识别系统的错误率、内存占用和计算吞吐量测量需求,假设在可移动或其他方式上准备。采用模糊C-means聚类和k-means聚类来提高SGMM方法的效率,并比较其精度、灵敏度和特异性等参数的结果。
{"title":"Speaker identification analysis for SGMM with k-means and fuzzy C-means clustering using SVM statistical technique","authors":"K. Manikandan, E. Chandra","doi":"10.3233/kes-210073","DOIUrl":"https://doi.org/10.3233/kes-210073","url":null,"abstract":"Speaker Identification denotes the speech samples of known speaker and it identifies the best matches of the input model. The SGMFC method is the combination of Sub Gaussian Mixture Model (SGMM) with the Mel-frequency Cepstral Coefficients (MFCC) for feature extraction. The SGMFC method minimizes the error rate, memory footprint and also computational throughput measure needs of a medium-vocabulary speaker identification system, supposed for preparation on a transportable or otherwise. Fuzzy C-means and k-means clustering are used in the SGMM method to attain the improved efficiency and their outcomes with parameters such as precision, sensitivity and specificity are compared.","PeriodicalId":210048,"journal":{"name":"Int. J. Knowl. Based Intell. Eng. Syst.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Knowl. Based Intell. Eng. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1