Essays about: "Network Speaker"
Showing result 1 - 5 of 27 essays containing the words Network Speaker.
-
1. Evaluation of Methods for Sound Source Separation in Audio Recordings Using Machine Learning
University essay from Linköpings universitet/KommunikationssystemAbstract : Sound source separation is a popular and active research area, especially with modern machine learning techniques. In this thesis, the focus is on single-channel separation of two speakers into individual streams, and specifically considering the case where two speakers are also accompanied by background noise. READ MORE
-
2. Circular Design of a Network Speaker
University essay from Lunds universitet/InnovationAbstract : The EU aims to be a circular economy by 2050, which is the driving force behind this master thesis. Circular transformation is one possible strategy to handle the climate crisis and achieve sustainable development. READ MORE
-
3. The brain in conversation: Mapping the neural correlates of turn-taking, production, and comprehension using fMRI
University essay from Stockholms universitet/Institutionen för lingvistikAbstract : Conversation is the primary mode of language use. A key feature of conversation is turn-taking, during which interlocutors rapidly switch between speaker and listener roles without conscious effort. READ MORE
-
4. Estimating the risk of insurance fraud based on tonal analysis
University essay from Lunds universitet/Matematisk statistikAbstract : Insurance companies utilize various methods for identifying claims that are of potential fraudulent nature. With the ever progressing field of artificial intelligence and machine learning models, great interest can be found within the industry to evaluate the use of new methods that may arise as a result of new advanced models in combination with the rich data that is being gathered. READ MORE
-
5. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE