2013
DOI: 10.1007/s10586-013-0284-5
|View full text |Cite
|
Sign up to set email alerts
|

Target speech feature extraction using non-parametric correlation coefficient

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Obviously, the highest absolute correlation values are reached by method 5 and method 6 (purple and light brown) and by method 1 (green) reaching the best correlation values leading to a strong downhill (negative) linear relationship between relevant parameters [22]. From Fig.…”
Section: A Cross-correlationmentioning
confidence: 84%
“…Obviously, the highest absolute correlation values are reached by method 5 and method 6 (purple and light brown) and by method 1 (green) reaching the best correlation values leading to a strong downhill (negative) linear relationship between relevant parameters [22]. From Fig.…”
Section: A Cross-correlationmentioning
confidence: 84%
“…Ontology inference engine is used to provide optimized design recommendation service based on context information inferred from collected computing resource. Previously developed service ontology [9,[22][23][24][25] logically infers the hierarchical relation between classes and attributes. This means the inference on important relation of meta-data including element with same significance, reverse relation, union, intersection.…”
Section: P2p Network Based Context Awarenessmentioning
confidence: 99%
“…Applications, devices, networks, and infrastructure are converging and creating an immense amount of content, which poses complex challenges for organizations, developers and users. In the field of security, we are seeing the convergence of frameworks and paradigms like augmented reality, ubiquitous computing and pervasive computing; and we are seeing new kinds of content, much of it user-generated, that can be searched, organized and consumed on many devices and in many formats [10][11][12][13][14][15] Division of Information and Communication, Baekseok University, Cheonan, Republic of Korea tion frameworks, scalable algorithms, and new paradigms for information discovery; and ways of searching, organizing and delivering converged information for delivery at the right place, at the right time and at the right level of detail. This special focus issue on convergence security systems will address the need for novel services and reviews security vulnerabilities in recent years.…”
mentioning
confidence: 99%