scholarly journals An Improved Text Extraction Approach with Auto Encoder for Creating Your Own Audiobook

2022 ◽  
Vol 12 (1) ◽  
pp. 0-0

As we all know, listening makes learning easier and interesting than reading. An audiobook is a software that converts text to speech. Though this sounds good, the audiobooks available in the market are not free and feasible for everyone. Added to this, we find that these audiobooks are only meant for fictional stories, novels or comics. A comprehensive review of the available literature shows that very little intensive work was done for image to speech conversion. In this paper, we employ various strategies for the entire process. As an initial step, deep learning techniques are constructed to denoise the images that are fed to the system. This is followed by text extraction with the help of OCR engines. Additional improvements are made to improve the quality of text extraction and post processing spell check mechanism are incorporated for this purpose. Our result analysis demonstrates that with denoising and spell checking, our model has achieved an accuracy of 98.11% when compared to 84.02% without any denoising or spell check mechanism.

Author(s):  
Feidu Akmel ◽  
Ermiyas Birihanu ◽  
Bahir Siraj

Software systems are any software product or applications that support business domains such as Manufacturing,Aviation, Health care, insurance and so on.Software quality is a means of measuring how software is designed and how well the software conforms to that design. Some of the variables that we are looking for software quality are Correctness, Product quality, Scalability, Completeness and Absence of bugs, However the quality standard that was used from one organization is different from other for this reason it is better to apply the software metrics to measure the quality of software. Attributes that we gathered from source code through software metrics can be an input for software defect predictor. Software defect are an error that are introduced by software developer and stakeholders. Finally, in this study we discovered the application of machine learning on software defect that we gathered from the previous research works.


Work ◽  
2021 ◽  
pp. 1-12
Author(s):  
Zhang Mengqi ◽  
Wang Xi ◽  
V.E. Sathishkumar ◽  
V. Sivakumar

BACKGROUND: Nowadays, the growth of smart cities is enhanced gradually, which collects a lot of information and communication technologies that are used to maximize the quality of services. Even though the intelligent city concept provides a lot of valuable services, security management is still one of the major issues due to shared threats and activities. For overcoming the above problems, smart cities’ security factors should be analyzed continuously to eliminate the unwanted activities that used to enhance the quality of the services. OBJECTIVES: To address the discussed problem, active machine learning techniques are used to predict the quality of services in the smart city manages security-related issues. In this work, a deep reinforcement learning concept is used to learn the features of smart cities; the learning concept understands the entire activities of the smart city. During this energetic city, information is gathered with the help of security robots called cobalt robots. The smart cities related to new incoming features are examined through the use of a modular neural network. RESULTS: The system successfully predicts the unwanted activity in intelligent cities by dividing the collected data into a smaller subset, which reduces the complexity and improves the overall security management process. The efficiency of the system is evaluated using experimental analysis. CONCLUSION: This exploratory study is conducted on the 200 obstacles are placed in the smart city, and the introduced DRL with MDNN approach attains maximum results on security maintains.


Author(s):  
Radhika Theagarajan ◽  
Shubham Nimbkar ◽  
Jeyan Arthur Moses ◽  
Chinnaswamy Anandharamakrishnan

2021 ◽  
Vol 11 (7) ◽  
pp. 317
Author(s):  
Ismael Cabero ◽  
Irene Epifanio

This paper presents a snapshot of the distribution of time that Spanish academic staff spend on different tasks. We carry out a statistical exploratory study by analyzing the responses provided in a survey of 703 Spanish academic staff in order to draw a clear picture of the current situation. This analysis considers many factors, including primarily gender, academic ranks, age, and academic disciplines. The tasks considered are divided into smaller activities, which allows us to discover hidden patterns. Tasks are not only restricted to the academic world, but also relate to domestic chores. We address this problem from a totally new perspective by using machine learning techniques, such as cluster analysis. In order to make important decisions, policymakers must know how academic staff spend their time, especially now that legal modifications are planned for the Spanish university environment. In terms of the time spent on quality of teaching and caring tasks, we expose huge gender gaps. Non-recognized overtime is very frequent.


2001 ◽  
Vol 1 (4) ◽  
pp. 282-290 ◽  
Author(s):  
F. C. Langbein ◽  
B. I. Mills ◽  
A. D. Marshall ◽  
R. R. Martin

Current reverse engineering systems can generate boundary representation (B-rep) models from 3D range data. Such models suffer from inaccuracies caused by noise in the input data and algorithms. The quality of reverse engineered geometric models can be improved by finding candidate shape regularities in such a model, and constraining the model to meet a suitable subset of them, in a post-processing step called beautification. This paper discusses algorithms to detect such approximate regularities in terms of similarities between feature objects describing properties of faces, edges and vertices, and small groups of these elements in a B-rep model with only planar, spherical, cylindrical, conical and toroidal faces. For each group of similar feature objects they also seek special feature objects which may represent the group, e.g. an integer value which approximates the radius of similar cylinders. Experiments show that the regularities found by the algorithms include the desired regularities as well as spurious regularities, which can be limited by an appropriate choice of tolerances.


2013 ◽  
Author(s):  
Florian Hinterleitner ◽  
Christoph R. Norrenbrock ◽  
Sebastian Möller ◽  
Ulrich Heute

Sign in / Sign up

Export Citation Format

Share Document