Search
Now showing items 1-10 of 10
SWAHILI TEXT AND SPEECH CORPUS: A REVIEW
(Innovative Journal, 2012)
This paper explores the review of Swahili text and speech databases/corpus in different dimensions i.e. word, sentence and phrases selections with their phonetics and selection of speakers. It also reviles the availability ...
Development of Isolated Numeric Speech Corpus for Swahili Language for Development of Automatic Speech Recognition System
(2013-07)
Speech corpus being the basic requirement for the development of Automatic speech recognition (ASR) system, it should be done with much accuracy in order to enhance the performance of the system. This paper describes the ...
A Literature Survey of Visual Similarity Snooping Attacks in Emails
(2020-08)
Snooping is one of the biggest issues that the cyber security industry is facing in this modern era of technology and it leads to big losses of finances both for individuals and organizations. The detection of snooping ...
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)
Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ...
An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)
Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ...
A Comparative Study of Deep Learning and Transfer Learning in Detection of Diabetic Retinopathy
(2022)
Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer learning are some of the approaches used in computer vision. The aim of this research was to do a comparative study of deep learning ...
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
(2023-08-08)
Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance of such models by extracting better quality features from data while removing irrelevant and redundant ...
Automatic Speech Recognition and Verification using LPC, MFCC and SVM
(2015-10)
Speech has much capability as an interface between human and computer which comes under the Human Computer interaction (HCI). The major challenge has been the nature of voice is ever varying speech signal. The paper presents ...
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
(Journal of Computer Security, 2023-02)
Increasing interest and advancement of internet and communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) have developed as indispensable defense ...
A Comparative Study of Transformer-based Models for Text Summarization of News Articles
(International Journal of Advanced Trends in Computer Science and Engineering, 2024-04)
Transformer-based models such as GPT, T5, BART, and PEGASUS have made substantial progress in text summarization, a sub-domain of natural language processing that entails extracting important information from lengthy texts. ...