Results 1 to 10 of about 2,584,848 (276)

Application of Fusion of Various Spontaneous Speech Analytics Methods for Improving Far-Field Neural-Based Diarization

open access: yesMathematics, 2021
Recently developed methods in spontaneous speech analytics require the use of speaker separation based on audio data, referred to as diarization. It is applied to widespread use cases, such as meeting transcription based on recordings from distant ...
Sergei Astapov   +9 more
doaj   +1 more source

An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms

open access: yesМоделирование и анализ информационных систем, 2021
To ensure traffic safety of railway transport, non-destructive tests of rails are regularly carried out by using various approaches and methods, including eddy-current flaw detection methods.
Egor V. Kuzmin   +4 more
doaj   +1 more source

Virtual Dialogue Assistant for Remote Exams

open access: yesMathematics, 2021
A Virtual Dialogue Assistant (VDA) is an automated system intended to provide support for conducting tests and examinations in the context of distant education platforms.
Anton Matveev   +6 more
doaj   +1 more source

Personalizing Hybrid-Based Dialogue Agents

open access: yesMathematics, 2022
In this paper, we present a continuation of our work on the personification of dialogue agents. We expand upon the previously demonstrated models—the ranking and generative models—and propose new hybrid models.
Yuri Matveev   +4 more
doaj   +1 more source

Severity Estimation of Defects on Interpretation of Eddy-Current Defectograms

open access: yesМоделирование и анализ информационных систем, 2021
To ensure traffic safety of railway transport, non-destructive tests of rails are regularly carried out by using various approaches and methods, including eddy-current flaw detection methods.
Egor V. Kuzmin   +4 more
doaj   +1 more source

Application of Convolutional Neural Networks for Recognizing Long Structural Elements of Rails in Eddy-Current Defectograms

open access: yesМоделирование и анализ информационных систем, 2020
To ensure traffic safety of railway transport, non-destructive test of rails is regularly carried out by using various approaches and methods, including eddy-current flaw detection methods.
Egor V. Kuzmin   +4 more
doaj   +1 more source

The First-Order Theory of Ordering Constraints over Feature Trees [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2001
The system FT< of ordering constraints over feature trees has been introduced as an extension of the system FT of equality constraints over feature trees.
Martin Müller   +2 more
doaj   +1 more source

Development of a Model Using Data Mining Technique to Test, Predict and Obtain Knowledge from the Academics Results of Information Technology Students

open access: yesData, 2022
Due to the huge amount of data obtained from students’ academic results in most tertiary institutions such as the colleges, polytechnics and universities, data mining has become one of the most effective tools for discovering vital knowledge from ...
Wisam Ibrahim   +4 more
doaj   +1 more source

The sensitivity of vegetation in the lower Tigris basin landscapes to regional and global climate variability

open access: yesPrzegląd Naukowy Inżynieria i Kształtowanie Środowiska, 2021
This study investigates the lower Tigris basin’s the normalized difference vegetation index (NDVI) sensitivity in 2000–2016 to regional climate variability reflected by the monthly precipitation and temperature time series of seven global datasets as ...
Ali S. Alhumaima, Sanjar M. Abdullaev
doaj   +1 more source

Classification of the presence of malignant lesions on mammogram using deep learning [PDF]

open access: yesDigital Diagnostics
BACKGROUND: Breast cancer is one of the leading causes of cancer-related mortality in women [1]. Regular mass screening with mammography plays a critical role in the early detection of changes in breast tissue.
Alisher A. Ibragimov   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy