Search
Now showing items 61-70 of 359
Gauss karışım modeli tabanlı konuşmacı belirleme sistemlerinde klasik MAP uyarlanması yönteminin performans analizi
(IEEE, 2010)
Gaussian mixture models (GMM) is one of the most commonly used methods in text-independent speaker identification systems. In this paper, performance of the GMM approach has been measured with different parameters and ...
Game theory based bitrate adaptation for Dash.Js reference player
(IEEE, 2018-11-28)
Most existing DASH adaptive bitrate (ABR) schemes are designed to behave in their own self-interest and do not perform consistently in all network environments. In this work, we provide a practical implementation, materials ...
ÖZÜ konuşmacı doğrulama sisteminin çok sınıflı senaryoda NIST 2010 veritabanı ile başarımı
(IEEE, 2011)
Performance of the speaker verification systems is typically measured based on their binary decision accuracy. However, in speaker verification applications where close to %100 accuracy is required, such as the systems ...
Automatically learning usage behavior and generating event sequences for black-box testing of reactive systems
(The ACM Digital Library, 2019-06)
We propose a novel technique based on recurrent artificial neural networks to generate test cases for black-box testing of reactive systems. We combine functional testing inputs that are automatically generated from a model ...
A novel runtime verification solution for LoT systems
(IEEE, 2018)
Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ...
Konuşmacı aradeğerlemeli SMM tabanlı metinden konuşma sentezleme si̇stemi
(IEEE, 2011)
Hidden Markov Model (HMM) based text-to-speech (TTS) systems offer many advantages compared to the concatenative approach. One of those advantages is the ability to interpolate between different speakers to generate new ...
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)
System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ...
Combined AES + AEGIS architectures for high performance and lightweight security applications
(Springer International Publishing, 2014)
AES has been the prominent block cipher since its introduction as the standard. It has been the cipher used in almost all new applications that require solid, unbreakable security with reasonable resource usage. Several ...
Vurgu ve söyleyiş modelleme hatalarının SMM tabanlı Türkçe MKS sistemindeki etkileri
(IEEE, 2011)
SMM tabanlı metinden konuşma sentezleme (SMM-MKS) yöntemi, gün geçtikçe daha 1 fazla araştırmacısının ilgisini çekmektedir. Bu yöntemin en önemli avantajlarından biri, birim seçmeli sistemlerde görülen bozulma etkilerinin ...
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach
(Elsevier, 2020-06)
Denial of Service attacks (DoS) are considered to be a major threat against today's communication networks. Recently, a novel networking paradigm that provides enhanced programming abilities has been proposed to attain an ...
Share this page