Browsing Computer Science by Title
Now showing items 309-328 of 496
-
NatiQ: An end-to-end text-to-speech system for arabic
(Association for Computational Linguistics (ACL), 2022)NatiQ is end-to-end text-to-speech system for Arabic. Our speech synthesizer uses an encoder-decoder architecture with attention. We used both tacotron-based models (tacotron-1 and tacotron-2) and the faster transformer ... -
Natural language features for detection of Alzheimer's disease in conversational speech
(IEEE, 2014)Automatic monitoring of the patients with Alzheimer's disease and diagnosis of the disease in early stages can have a significant impact on the society. Here, we investigate an automatic diagnosis approach through the use ... -
A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance
(Elsevier, 2019-03)The problem of allocating students to supervisors for the development of a personal project or a dissertation is a crucial activity in the higher education environment, as it enables students to get feedback on their work ... -
Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis
(IEEE, 2013)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Need for low latency: Media over QUIC
(ACM, 2023-06-16)This paper overviews developing a low-latency solution for media ingest and distribution, the work undertaken by the IETF's new Media over QUIC (moq) working group. It summarizes the motivation, goals, current work and ... -
NEEL: The nested complex event language for real-time event analytics
(Springer International Publishing, 2011)Complex event processing (CEP) over event streams has become increasingly important for real-time applications ranging from health care, supply chain management to business intelligence. These monitoring applications submit ... -
Negotiation for incentive driven privacy-preserving information sharing
(Springer International Publishing, 2017)This paper describes an agent-based, incentive-driven, and privacy-preserving information sharing framework. Main contribution of the paper is to give the data provider agent an active role in the information sharing process ... -
Not all mistakes are equal
(The ACM Digital Library, 2020)In many tasks, classifiers play a fundamental role in the way an agent behaves. Most rational agents collect sensor data from the environment, classify it, and act based on that classification. Recently, deep neural networks ... -
Nova: Value-based negotiation of norms
(ACM, 2021-08-01)Specifying a normative multiagent system (nMAS) is challenging, because different agents often have conflicting requirements. Whereas existing approaches can resolve clear-cut conflicts, tradeoffs might occur in practice ... -
A novel GBT-based approach for cross-channel fraud detection on real-world banking transactions
(IEEE, 2022)The most recent research on hundreds of financial institutions uncovered that only 26 % of them have a team assigned to detect cross-channel fraud. Due to the developing technologies, various fraud techniques have emerged ... -
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks
(Universitas Ahmad Dahlan, 2018-03)Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel ... -
A novel runtime verification solution for LoT systems
(IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
NTIRE 2022 challenge on night photography rendering
(IEEE, 2022)This paper reviews the NTIRE 2022 challenge on night photography rendering. The challenge solicited solutions that processed RAW camera images captured in night scenes to produce a photo-finished output image encoded in ... -
Objective and subjective QoE evaluation for adaptive point cloud streaming
(IEEE, 2020-05)Volumetric media has the potential to provide the six degrees of freedom (6DoF) required by truly immersive media. However, achieving 6DoF requires ultra-high bandwidth transmissions, which real-world wide area networks ... -
Observing interoperability of IoT systems through model-based testing
(Springer Nature, 2018)Internet of Things (IoT) has drastically modified the industrial services provided through autonomous machine-to-machine interactions. Such systems comprise of devices manufactured by various suppliers. Verification is a ... -
OCR-aided person annotation and label propagation for speaker modeling in TV shows
(IEEE, 2016)In this paper, we present an approach for minimizing human effort in manual speaker annotation. Label propagation is used at each iteration of an active learning cycle. More precisely, a selection strategy for choosing the ... -
Offloading deep learning powered vision tasks from UAV to 5G edge server with denoising
(IEEE, 2023-06)Offloading computationally heavy tasks from an unmanned aerial vehicle (UAV) to a remote server helps improve battery life and can help reduce resource requirements. Deep learning based state-of-the-art computer vision ... -
On characterizing sectoral interactions via connections between employees in professional online social networks
(Elsevier, 2018-12)The collaboration among individuals is essential to maximize economic efficiency. Today most of the technological and economical advancements require multidisciplinary efforts. Therefore promoting interaction and knowledge ... -
On context-aware DDoS attacks using deep generative networks
(IEEE, 2018-10)Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ... -
On spectral analysis of the Internet delay space and detecting anomalous routing paths
(TÜBİTAK, 2019)Latency is one of the most critical performance metrics for a wide range of applications. Therefore, it is important to understand the underlying mechanisms that give rise to the observed latency values and diagnose the ...
Share this page