首页 > 最新文献

2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
A Comparative Analysis of N-Gram Deep Neural Network Approach to Classifying Human Perception on Dengvaxia N-Gram深度神经网络对登卡夏人感知分类的比较分析
Angelu Bianca C. Abrigo, M. R. Estuar
The increasing use of social media platform like Twitter provides opportunity for information dissemination to the public. The Dengvaxia controversy in the Philippines negatively affected the public’s perception towards vaccination. It has been noted that due to this incident, many parents have decided not to have their children vaccinated due to fear of endangering them [2]. This resulted to children contracting other diseases like measles due to the lack of immunization [1] [2]. The preference to not have newborns undergo vaccination program remains a threat to public health. Using publicly accessible tweets, this study aims to understand health perceptions of the public in relation to Dengvaxia. A deep neural network approach using n-gram vectorization is used in comparison to the Doc2Vec neural network classifier to identify tweets containing personal perception on health. It was discovered that not only does the bigram model perform better in classifying than the Doc2Vec model with a performance measure of 86.25% accuracy, 0.85 precision, 0.86 ROC and 0.85 F1 score, but also it is able to identify clearer and more diverse topic using LDA topic modeling in comparison with unigram and trigram model. This method allows the monitoring of public perception and acceptance towards the implementation of a new medication or vaccination especially after the Dengvaxia scandal that the Philippines experienced.
越来越多地使用Twitter等社交媒体平台,为公众提供了信息传播的机会。菲律宾的登卡夏争议对公众对疫苗接种的看法产生了负面影响。值得注意的是,由于这次事件,许多家长因为担心危及孩子而决定不给孩子接种疫苗[2]。这导致儿童因缺乏免疫接种而感染麻疹等其他疾病[1][2]。不让新生儿接受疫苗接种计划的倾向仍然是对公共卫生的威胁。利用可公开访问的推文,本研究旨在了解公众对登卡夏的健康看法。与Doc2Vec神经网络分类器相比,使用n-gram矢量化的深度神经网络方法来识别包含个人健康感知的推文。研究发现,双图模型不仅在分类方面优于Doc2Vec模型,准确率达到86.25%,精密度为0.85,ROC为0.86,F1分数为0.85,而且与单图和三图模型相比,使用LDA主题建模可以识别出更清晰、更多样化的主题。这种方法可以监测公众对实施新药物或疫苗接种的看法和接受程度,特别是在菲律宾经历了登卡夏丑闻之后。
{"title":"A Comparative Analysis of N-Gram Deep Neural Network Approach to Classifying Human Perception on Dengvaxia","authors":"Angelu Bianca C. Abrigo, M. R. Estuar","doi":"10.1109/INFOCT.2019.8711432","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711432","url":null,"abstract":"The increasing use of social media platform like Twitter provides opportunity for information dissemination to the public. The Dengvaxia controversy in the Philippines negatively affected the public’s perception towards vaccination. It has been noted that due to this incident, many parents have decided not to have their children vaccinated due to fear of endangering them [2]. This resulted to children contracting other diseases like measles due to the lack of immunization [1] [2]. The preference to not have newborns undergo vaccination program remains a threat to public health. Using publicly accessible tweets, this study aims to understand health perceptions of the public in relation to Dengvaxia. A deep neural network approach using n-gram vectorization is used in comparison to the Doc2Vec neural network classifier to identify tweets containing personal perception on health. It was discovered that not only does the bigram model perform better in classifying than the Doc2Vec model with a performance measure of 86.25% accuracy, 0.85 precision, 0.86 ROC and 0.85 F1 score, but also it is able to identify clearer and more diverse topic using LDA topic modeling in comparison with unigram and trigram model. This method allows the monitoring of public perception and acceptance towards the implementation of a new medication or vaccination especially after the Dengvaxia scandal that the Philippines experienced.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Aircraft Altitude Control Based on CDM 基于CDM的飞机高度控制
E. Asa, Y. Yamamoto, T. Benjanarasuth
This research presents the controller design for aircraft altitude control based on Coefficient Diagram Method (CDM). The controller, which is designed by CDM, guarantees a good balance of stability, response and robustness. The simulation results of the proposed control system show that the controller is able to control the aircraft altitude as desired and has a disturbance rejection behavior and the response speed can be easily adjusted by specification of the equivalent time constant. As the result, the controller design processes are less complex than other methods and the controller is still effective.
研究了基于系数图法的飞机高度控制控制器设计。该控制器采用CDM算法设计,保证了系统的稳定性、响应性和鲁棒性之间的良好平衡。仿真结果表明,该控制系统能够按要求控制飞机高度,具有良好的抗扰性能,并且通过指定等效时间常数可以很容易地调节响应速度。因此,控制器的设计过程比其他方法简单,并且控制器仍然有效。
{"title":"Aircraft Altitude Control Based on CDM","authors":"E. Asa, Y. Yamamoto, T. Benjanarasuth","doi":"10.1109/INFOCT.2019.8710881","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710881","url":null,"abstract":"This research presents the controller design for aircraft altitude control based on Coefficient Diagram Method (CDM). The controller, which is designed by CDM, guarantees a good balance of stability, response and robustness. The simulation results of the proposed control system show that the controller is able to control the aircraft altitude as desired and has a disturbance rejection behavior and the response speed can be easily adjusted by specification of the equivalent time constant. As the result, the controller design processes are less complex than other methods and the controller is still effective.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Online Extremism Discovering through Social Network Structure Analysis 通过社会网络结构分析发现网络极端主义
M. Petrovskiy, M. Chikunov
The activity of extremist organizations on the Internet is continuously growing with the increase of Web’s usage for means of communication. Therefore analysis of radical members in social networks provides important information on how to prevent them propagate ideology and recruiting new members in the future. But nowadays terrorists often use confidential chats and private threads to communicate, thus it’s quite hard to detect them using only the public messages they generate. In fact, it is usually known that some users of social networks are dangerous, another are innocent, and no information is available about the remaining users. In this paper, we propose an approach for detecting radical users of social network among unknown ones by analyzing their relationships and features as of vertices of social graph without usage of any information about text content they generate. We find that the proposed method is very promising and may be efficiently used for real-time monitoring systems and future terrorism and extremism research.
随着网络作为传播手段的日益普及,极端组织在互联网上的活动也在不断增加。因此,对社交网络中激进分子的分析为今后如何防止他们传播意识形态和招募新成员提供了重要的信息。但现在恐怖分子经常使用保密聊天和私人线程进行通信,因此仅使用他们生成的公开信息很难发现他们。事实上,人们通常知道社交网络的一些用户是危险的,另一些是无辜的,并且没有关于其余用户的信息。在本文中,我们提出了一种在不使用他们生成的文本内容的任何信息的情况下,通过分析他们作为社交图顶点的关系和特征,在未知用户中检测激进社交网络用户的方法。我们发现所提出的方法非常有前途,可以有效地用于实时监测系统和未来的恐怖主义和极端主义研究。
{"title":"Online Extremism Discovering through Social Network Structure Analysis","authors":"M. Petrovskiy, M. Chikunov","doi":"10.1109/INFOCT.2019.8711254","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711254","url":null,"abstract":"The activity of extremist organizations on the Internet is continuously growing with the increase of Web’s usage for means of communication. Therefore analysis of radical members in social networks provides important information on how to prevent them propagate ideology and recruiting new members in the future. But nowadays terrorists often use confidential chats and private threads to communicate, thus it’s quite hard to detect them using only the public messages they generate. In fact, it is usually known that some users of social networks are dangerous, another are innocent, and no information is available about the remaining users. In this paper, we propose an approach for detecting radical users of social network among unknown ones by analyzing their relationships and features as of vertices of social graph without usage of any information about text content they generate. We find that the proposed method is very promising and may be efficiently used for real-time monitoring systems and future terrorism and extremism research.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Novel Scheme for Express Sheet Design and Realization Based on Portrait Storage with QR Code 基于QR码纵向存储的快件设计与实现新方案
L. He, Zhifeng Ge, Zhongjie Zhu, Chongchong Jin
The article introduces a novel scheme of express sheet design and realization based on portrait storage with QR code. For a given portrait image, it is first preprocessed then compressed and embedded into a QR code. The aim of the proposed scheme is mainly to address the problems of storing high quality images within limited memory space and preserving good visual quality of reconstructed images. Experiments are conducted and the results show the proposed scheme is both feasible and effective.
介绍了一种基于QR码纵向存储的快递单设计与实现的新方案。对于给定的肖像图像,首先对其进行预处理,然后将其压缩并嵌入QR码中。该方案的主要目的是解决在有限的存储空间内存储高质量图像和保持重建图像的良好视觉质量的问题。实验结果表明,该方案是可行的、有效的。
{"title":"Novel Scheme for Express Sheet Design and Realization Based on Portrait Storage with QR Code","authors":"L. He, Zhifeng Ge, Zhongjie Zhu, Chongchong Jin","doi":"10.1109/INFOCT.2019.8711073","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711073","url":null,"abstract":"The article introduces a novel scheme of express sheet design and realization based on portrait storage with QR code. For a given portrait image, it is first preprocessed then compressed and embedded into a QR code. The aim of the proposed scheme is mainly to address the problems of storing high quality images within limited memory space and preserving good visual quality of reconstructed images. Experiments are conducted and the results show the proposed scheme is both feasible and effective.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal and Evaluation of A Method for Automatically Classifying Images of Agricultural Work and Animals Acquired with Motion Sensor Cameras 一种运动传感器采集的农工和动物图像自动分类方法的提出与评价
Masanori Takagi, Ryu Hirano
We have developed a field monitoring system (http://kansatu.net) using network-connected cameras and sensors installed in apple trees to support the hands-on agriculture curriculum of an elementary school. The system enables to collects and stores a variety of images taken by network-connected cameras equipped with infrared motion sensors. Agricultural works and animals are photographed in these images. The system has been in place seven years since 2011, during which time, there have been years in which more than approximately 50,000 images were collected. However, these data have not been used effectively to learn agricultural works. On the other side, in recent years, damage to agricultural crops by wild animals has been increasing. From these backgrounds, our ultimate goal is to utilize the images captured by motion sensor-equipped network cameras to develop countermeasures to prevent wild animals from damaging agricultural crops and to educate and cultivate future farmers. In this study, we proposed a method that employs image analysis technology and the date and time of image capture to automatically classify images acquired by the motion sensor network cameras by type of agricultural work and animal. We also developed a method for automatically classifying the type of agricultural work. We evaluated the accuracy of the developed method by comparing the results of automated classification with the results of manual classification. The recall of the proposed method exceeded 90% for all three types of agricultural work tested, which was equal to or greater than the classification accuracy achieved with manual classification.
我们开发了一个现场监测系统(http://kansatu.net),使用安装在苹果树上的联网摄像机和传感器,以支持一所小学的实践农业课程。该系统能够收集和存储由配备红外运动传感器的网络连接摄像机拍摄的各种图像。这些图像拍摄了农业工程和动物。自2011年以来,该系统已经运行了7年,在此期间,有几年收集了大约5万多张图像。然而,这些数据并没有被有效地用于学习农业工作。另一方面,近年来,野生动物对农作物的破坏一直在增加。基于这些背景,我们的最终目标是利用配备运动传感器的网络摄像机捕获的图像来制定对策,以防止野生动物破坏农作物,并教育和培养未来的农民。在本研究中,我们提出了一种利用图像分析技术和图像捕获的日期和时间对运动传感器网络摄像机获取的图像进行农业劳动类型和动物类型自动分类的方法。我们还开发了一种自动分类农业工作类型的方法。我们通过比较自动分类结果和人工分类结果来评估所开发方法的准确性。对于所有三种类型的农业工作,所提出的方法的召回率超过90%,这等于或大于人工分类所达到的分类精度。
{"title":"Proposal and Evaluation of A Method for Automatically Classifying Images of Agricultural Work and Animals Acquired with Motion Sensor Cameras","authors":"Masanori Takagi, Ryu Hirano","doi":"10.1109/INFOCT.2019.8710963","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710963","url":null,"abstract":"We have developed a field monitoring system (http://kansatu.net) using network-connected cameras and sensors installed in apple trees to support the hands-on agriculture curriculum of an elementary school. The system enables to collects and stores a variety of images taken by network-connected cameras equipped with infrared motion sensors. Agricultural works and animals are photographed in these images. The system has been in place seven years since 2011, during which time, there have been years in which more than approximately 50,000 images were collected. However, these data have not been used effectively to learn agricultural works. On the other side, in recent years, damage to agricultural crops by wild animals has been increasing. From these backgrounds, our ultimate goal is to utilize the images captured by motion sensor-equipped network cameras to develop countermeasures to prevent wild animals from damaging agricultural crops and to educate and cultivate future farmers. In this study, we proposed a method that employs image analysis technology and the date and time of image capture to automatically classify images acquired by the motion sensor network cameras by type of agricultural work and animal. We also developed a method for automatically classifying the type of agricultural work. We evaluated the accuracy of the developed method by comparing the results of automated classification with the results of manual classification. The recall of the proposed method exceeded 90% for all three types of agricultural work tested, which was equal to or greater than the classification accuracy achieved with manual classification.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Certification Aspects of Model Based Development for Airborne Software 机载软件基于模型开发的认证问题
T. Saraç
{"title":"Certification Aspects of Model Based Development for Airborne Software","authors":"T. Saraç","doi":"10.1109/infoct.2019.8711129","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711129","url":null,"abstract":"","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICICT 2019 Cover Page ICICT 2019封面页
{"title":"ICICT 2019 Cover Page","authors":"","doi":"10.1109/infoct.2019.8711279","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711279","url":null,"abstract":"","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Application on Geoscience Literature Knowledge Discovery Technology 地学文献知识发现技术研究与应用
Lv Pengfei, Wang Chunning
Based on the characteristics of geoscience literature, this paper designs a knowledge discovery technology framework, which consists of data preprocessing, relationship extraction and visual presentation. The main technical features are the use of dictionary-based maximum reverse matching word segmentation algorithm and the selection of the statistical language model based relationship extraction method. Finally, a distributed computing environment was built in the experiment, and the Mapping knowledge domain of the goldfield was constructed so that the feasibility of the technical framework was verified by experiments.
根据地学文献的特点,设计了一个由数据预处理、关系提取和可视化呈现组成的知识发现技术框架。主要技术特点是采用基于字典的最大反向匹配分词算法和选择基于统计语言模型的关系提取方法。最后,在实验中搭建了分布式计算环境,构建了金矿地图知识域,通过实验验证了技术框架的可行性。
{"title":"Research and Application on Geoscience Literature Knowledge Discovery Technology","authors":"Lv Pengfei, Wang Chunning","doi":"10.1109/INFOCT.2019.8711400","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711400","url":null,"abstract":"Based on the characteristics of geoscience literature, this paper designs a knowledge discovery technology framework, which consists of data preprocessing, relationship extraction and visual presentation. The main technical features are the use of dictionary-based maximum reverse matching word segmentation algorithm and the selection of the statistical language model based relationship extraction method. Finally, a distributed computing environment was built in the experiment, and the Mapping knowledge domain of the goldfield was constructed so that the feasibility of the technical framework was verified by experiments.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"700 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133522942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Persuasive Recommender Systems 走向有说服力的推荐系统
Ala'a N. Alslaity, T. Tran
The primary objective of recommender systems, in a general sense, is to recommend items to users rather than to persuade users to get those items. Hence, a recommender system is not a persuasive technology by itself. In recent years, however, there has been increasing attention in the literature towards augmenting persuasiveness features into recommender systems. Several researchers have discussed the feasibility of enriching recommendations with persuasive messages. Nonetheless, there is a lack of works that discuss how to incorporate personalized and dynamic persuasive capabilities to recommender systems. To mitigate this issue, we propose the Personalized Persuasive RS (PerPer) framework. The PerPer adopts learning automata concepts to dynamically choose a suitable persuasive strategy for users in a personalized manner. PerPer is general enough to be plugged into different recommenders and to consider several persuasive strategies. PerPer aims to provide a simple and straightforward way to incorporate persuasive features to recommenders. By this, it would have the potential of increasing users’ perceived acceptance of recommendations
一般来说,推荐系统的主要目标是向用户推荐商品,而不是说服用户购买这些商品。因此,推荐系统本身并不是说服技术。然而,近年来,越来越多的文献关注于在推荐系统中增加说服力特征。一些研究人员讨论了用有说服力的信息充实推荐的可行性。然而,缺乏讨论如何将个性化和动态说服能力纳入推荐系统的工作。为了缓解这个问题,我们提出了个性化说服RS (PerPer)框架。PerPer采用学习自动机的概念,以个性化的方式动态选择适合用户的说服策略。PerPer足够通用,可以被插入到不同的推荐器中,并考虑几种有说服力的策略。PerPer旨在提供一种简单直接的方式来将有说服力的功能整合到推荐人中。这样,它就有可能增加用户对推荐的接受程度
{"title":"Towards Persuasive Recommender Systems","authors":"Ala'a N. Alslaity, T. Tran","doi":"10.1109/INFOCT.2019.8711416","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711416","url":null,"abstract":"The primary objective of recommender systems, in a general sense, is to recommend items to users rather than to persuade users to get those items. Hence, a recommender system is not a persuasive technology by itself. In recent years, however, there has been increasing attention in the literature towards augmenting persuasiveness features into recommender systems. Several researchers have discussed the feasibility of enriching recommendations with persuasive messages. Nonetheless, there is a lack of works that discuss how to incorporate personalized and dynamic persuasive capabilities to recommender systems. To mitigate this issue, we propose the Personalized Persuasive RS (PerPer) framework. The PerPer adopts learning automata concepts to dynamically choose a suitable persuasive strategy for users in a personalized manner. PerPer is general enough to be plugged into different recommenders and to consider several persuasive strategies. PerPer aims to provide a simple and straightforward way to incorporate persuasive features to recommenders. By this, it would have the potential of increasing users’ perceived acceptance of recommendations","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Intelligent Approach of Text-To-Speech Synthesizers for English and Sinhala Languages 英语和僧伽罗语文本语音合成器的智能方法
P. Jayawardhana, A. Aponso, Naomi Krishnarajah, A. Rathnayake
This paper attempts to investigate novel Text-to-Speech algorithm based on Deep voice which is an attention based, fully convolutional mechanism. The procedure of producing speech synthesis involves with learning statistical model of the human vocal production mechanism which is eligible of taking some text and vocalize that as speech. This paper would reveal the route of the attempt where there is the destination of accuracy and realism. Serenity and fluency are the most important qualities which expect from a TTS. The idea is to give an outline of discourse amalgamation in the Sinhala language, compresses and replicates about the characteristics of different blend procedures utilized. The proposed TTS synthesizing with the neural network based approach to perform phonetic-to-acoustic mapping has described by the purpose of applying for multilingual synthesizers.
本文试图研究一种新的基于深度语音的文本到语音算法,这是一种基于注意的全卷积机制。语音合成的产生过程涉及到学习人类语音产生机制的统计模型,该模型有资格将某些文本作为语音发出。本文将揭示这一尝试的路径,其中有准确性和真实性的目标。平静和流利是TTS最重要的品质。本文的目的是对僧伽罗语的语篇融合进行概述,并对不同融合过程的特点进行压缩和复制。提出了一种基于神经网络的TTS合成方法,用于多语言合成器的声声映射。
{"title":"An Intelligent Approach of Text-To-Speech Synthesizers for English and Sinhala Languages","authors":"P. Jayawardhana, A. Aponso, Naomi Krishnarajah, A. Rathnayake","doi":"10.1109/INFOCT.2019.8711051","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711051","url":null,"abstract":"This paper attempts to investigate novel Text-to-Speech algorithm based on Deep voice which is an attention based, fully convolutional mechanism. The procedure of producing speech synthesis involves with learning statistical model of the human vocal production mechanism which is eligible of taking some text and vocalize that as speech. This paper would reveal the route of the attempt where there is the destination of accuracy and realism. Serenity and fluency are the most important qualities which expect from a TTS. The idea is to give an outline of discourse amalgamation in the Sinhala language, compresses and replicates about the characteristics of different blend procedures utilized. The proposed TTS synthesizing with the neural network based approach to perform phonetic-to-acoustic mapping has described by the purpose of applying for multilingual synthesizers.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1