A systematic approach for English education model based on the neural network algorithm

2020 ◽  
pp. 1-12
Author(s):  
Wang Hui ◽  
Li Aiyuan

This paper algorithms based on neural network model designed for English education, to develop a model education system with artificial intelligence, summarized the dimensions were can be used for data analysis related indicators. These indicators include not only the contents of the learning behavior, test behavior, cooperation behavior and resource search behavior and other human-computer interaction behavior data, also includes demographic background information, learning ability, learning attitude, and other characteristic data that affect the learning effect. We tried to collect relevant indicators to the maximum extent. An audiovisual fusion method based on Convolutional Neural Network (CNN) is proposed. The independent CNN structure is used to realize independent modeling of audiovisual perception and asynchronous information transmission and obtain the description of audiovisual parallel data in the high-dimensional feature space. Following the shared fully connected structure, it is possible to model the long-term dependence of audiovisual parallel data in a higher dimension. Experiments show that the AVSR system built using a CNN-based audiovisual fusion method can achieve a significant performance improvement, and its recognition error rate is relatively reduced by about 15%. The speech recognition system trained with the cross-domain adaptive method can obtain a significant performance improvement, and its recognition error rate is more than 10% lower than that of the baseline system..

Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 165
Author(s):  
Xintong Wang ◽  
Chuangang Zhao

Recent research shows recurrent neural network-Transducer (RNN-T) architecture has become a mainstream approach for streaming speech recognition. In this work, we investigate the VGG2 network as the input layer to the RNN-T in streaming speech recognition. Specifically, before the input feature is passed to the RNN-T, we introduce a gated-VGG2 block, which uses the first two layers of the VGG16 to extract contextual information in the time domain, and then use a SEnet-style gating mechanism to control what information in the channel domain is to be propagated to RNN-T. The results show that the RNN-T model with the proposed gated-VGG2 block brings significant performance improvement when compared to the existing RNN-T model, and it has a lower latency and character error rate than the Transformer-based model.


2020 ◽  
pp. 1-12
Author(s):  
Ping Hu ◽  
Lijing Diao

Under the Internet information network environment, College English teaching mode is faced with a new choice and transformation. SPOC and STEAM classes have multiple advantages, which can make up for the lack of a single teaching model and provide new ideas for teaching reform. It is a practical application of statistical method to optimize the model of artificial neural network by machine learning method of statistics. The application of mathematical statistics can solve some related problems of artificial perception. Therefore, artificial neural network has the same simple decision ability and judgment ability as human beings. In this paper, the authors analyze the image invariant features and SVM algorithms application in college English education platform. The results show that this method has a positive effect on learners’ English proficiency and learning effect. Teachers also avoid paying a lot of labor, which is very beneficial to the implementation of innovative teaching. However, compared with the traditional teaching, the phenomenon of student achievement differentiation is very serious, and teaching is facing great pressure. Therefore, improving students’ autonomous learning ability and teachers’ information literacy is still very helpful to improve the teaching effect.


Author(s):  
S. Vijaya Rani ◽  
G. N. K. Suresh Babu

The illegal hackers  penetrate the servers and networks of corporate and financial institutions to gain money and extract vital information. The hacking varies from one computing system to many system. They gain access by sending malicious packets in the network through virus, worms, Trojan horses etc. The hackers scan a network through various tools and collect information of network and host. Hence it is very much essential to detect the attacks as they enter into a network. The methods  available for intrusion detection are Naive Bayes, Decision tree, Support Vector Machine, K-Nearest Neighbor, Artificial Neural Networks. A neural network consists of processing units in complex manner and able to store information and make it functional for use. It acts like human brain and takes knowledge from the environment through training and learning process. Many algorithms are available for learning process This work carry out research on analysis of malicious packets and predicting the error rate in detection of injured packets through artificial neural network algorithms.


Author(s):  
Jet Gabrielle Sanders ◽  
Yoshiyuki Ueda ◽  
Sakiko Yoshikawa ◽  
Rob Jenkins

Abstract Background Recent experimental work has shown that hyper-realistic face masks can pass for real faces during live viewing. However, live viewing embeds the perceptual task (mask detection) in a powerful social context that may influence respondents’ behaviour. To remove this social context, we assessed viewers’ ability to distinguish photos of hyper-realistic masks from photos of real faces in a computerised two-alternative forced choice (2AFC) procedure. Results In experiment 1 (N = 120), we observed an error rate of 33% when viewing time was restricted to 500 ms. In experiment 2 (N = 120), we observed an error rate of 20% when viewing time was unlimited. In both experiments we saw a significant performance cost for other-race comparisons relative to own-race comparisons. Conclusions We conclude that viewers could not reliably distinguish hyper-realistic face masks from real faces in photographic presentations. As well as its theoretical interest, failure to detect synthetic faces has important implications for security and crime prevention, which often rely on facial appearance and personal identity being related.


2020 ◽  
Vol 12 (12) ◽  
pp. 168781402098468
Author(s):  
Xianbin Du ◽  
Youqun Zhao ◽  
Yijiang Ma ◽  
Hongxun Fu

The camber and cornering properties of the tire directly affect the handling stability of vehicles, especially in emergencies such as high-speed cornering and obstacle avoidance. The structural and load-bearing mode of non-pneumatic mechanical elastic (ME) wheel determine that the mechanical properties of ME wheel will change when different combinations of hinge length and distribution number are adopted. The camber and cornering properties of ME wheel with different hinge lengths and distributions were studied by combining finite element method (FEM) with neural network theory. A ME wheel back propagation (BP) neural network model was established, and the additional momentum method and adaptive learning rate method were utilized to improve BP algorithm. The learning ability and generalization ability of the network model were verified by comparing the output values with the actual input values. The camber and cornering properties of ME wheel were analyzed when the hinge length and distribution changed. The results showed the variation of lateral force and aligning torque of different wheel structures under the combined conditions, and also provided guidance for the matching of wheel and vehicle performance.


2021 ◽  
Vol 11 (15) ◽  
pp. 7088
Author(s):  
Ke Yang ◽  
Yongjian Wang ◽  
Shidong Fan ◽  
Ali Mosleh

Spare parts management is a critical issue in the industrial field, alongside planning maintenance and logistics activities. For accurate classification in particular, the decision-makers can determine the optimal inventory management strategy. However, problems such as criteria selection, rules explanatory, and learning ability arise when managing thousands of spare parts for modern industry. This paper presents a deep convolutional neural network based on graph (G-DCNN) which will realize multi-criteria classification through image identification based on an explainable hierarchical structure. In the first phase, a hierarchical classification structure is established according to the causal relationship of multiple criteria; in the second phase, nodes are colored according to their criteria level status so that the traditional numerical information can be visible through graph style; in the third phase, the colored structures are transferred into images and processed by structure-modified convolutional neural network, to complete the classification. Finally, the proposed method is applied in a real-world case study to validate its effectiveness, feasibility, and generality. This classification study supplies a good decision support to improve the monitor-focus on critical component and control inventory which will benefit the collaborative maintenance.


2021 ◽  
Vol 92 ◽  
pp. 107174
Author(s):  
Yang Zhou ◽  
Xiaomin Yang ◽  
Rongzhu Zhang ◽  
Kai Liu ◽  
Marco Anisetti ◽  
...  

2014 ◽  
Vol 998-999 ◽  
pp. 943-946
Author(s):  
Jing Liu ◽  
Guo Xin Wang

As the earliest practical controller, PID controller has more than 50 years of history, and it is still the most widely used and most common industrial controllers. PID controller is simple to understand and use, without a prerequisite for an accurate model of the physical system, thus become the most popular, the most common controller. The reason why PID controller is the first developed one is that its simple algorithm, robustness and high reliability. It is widely used in process control and motion control, especially for accurate mathematical model that can be established deterministic control system. But the conventional PID controller tuning parameters are often poor performance, poor adaptability to the operating environment. The neural network has a strong nonlinear mapping ability, competence, self-learning ability of associative memory, and has a viable quantities of information processing methods and good fault tolerance.


Sign in / Sign up

Export Citation Format

Share Document