Search
Now showing items 1611-1620 of 1948
Long-range two-particle correlations of strange hadrons with charged particles in pPb and PbPb collisions at LHC energies
(Elsevier, 2015-03-06)
Measurements of two-particle angular correlations between an identified strange hadron (View the MathML source or View the MathML source) and a charged particle, emitted in pPb collisions, are presented over a wide range ...
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Simplified transfer function approach for modeling frequency dependency of damping characteristics of rubber bushings
(Sage, 2019-09)
Physical systems that consist of parts and vibration isolators such as rubber bushings are usually modeled in multibody simulations, where parts are represented as rigid bodies with their mass and inertia properties and ...
Modeling the development of infant imitation using inverse reinforcement learning
(IEEE, 2018-09)
Little is known about the computational mechanisms of how imitation skills develop along with infant sensorimotor learning. In robotics, there are several well developed frameworks for imitation learning or so called ...
Şebeke kaynaklı müşteri şikayetleri için akıllı teşhis ve çözüm sistemleri
(IEEE, 2016)
In the telecommunication sector, there exists a vast variety of protocol data (Such as ADR, IUCS, GB, IUPS, GN) produced by signaling systems. The data contains various information regarding network quality and performance. ...
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)
Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ...
A literature review on inventory management in humanitarian supply chains
(Elsevier, 2016)
In this paper, we present a review and analysis of studies that focus on humanitarian inventory planning and management. Specifically, we focus on papers which develop policies and models to determine how much to stock, ...
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)
Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ...
Performance of two real-life California bridges under regional natural hazards
(2016-03)
The performance of two real-life California bridges is assessed under a possible regional multihazard condition involving floods and earthquakes. For flood events with varied frequency, expected scour depths at bridge piers ...
Measurements of tt¯ spin correlations and top quark polarization using dilepton final states in pp collisions at s√=8 T
(American Physical Society., 2016-03-01)
Measurements of the top quark-antiquark (tt¯) spin correlations and the top quark polarization are presented for tt¯ pairs produced in pp collisions at s√=8 TeV. The data correspond to an integrated luminosity of 19.5 fb−1 ...
Share this page