نتایج جستجو برای: endpoint detection

تعداد نتایج: 586746  

1998
Jia-Lin Shen Jeih-Weih Hung Lin-Shan Lee

This paper presents an entropy-based algorithm for accurate and robust endpoint detection for speech recognition under noisy environments. Instead of using the conventional energy-based features, the spectral entropy is developed to identify the speech segments accurately. Experimental results show that this algorithm outperforms the energy-based algorithms in both detection accuracy and recogn...

2012
Tim M Jenkins Trevor S Smart Frances Hackman Carol Cooke Keith KC Tan

BACKGROUND Detecting the efficacy of novel analgesic agents in neuropathic pain is challenging. There is a critical need for study designs with the desirable characteristics of assay sensitivity, low placebo response, reliable pain recordings, low cost, short duration of exposure to test drug and placebo, and relevant and recruitable population. METHODS We designed a proof-of-concept, double-...

Journal: :Clinical chemistry 2000
R Patel R Pollner S de Keczer J Pease M Pirio N DeChene A Dafforn S Rose

BACKGROUND Simplified and cost-effective methods for the detection and quantification of nucleic acid targets are still a challenge in molecular diagnostics. METHODS Luminescent oxygen channeling assay (LOCI(TM)) latex particles can be conjugated to synthetic oligodeoxynucleotides and hybridized, via linking probes, to different DNA targets. These oligomer-conjugated LOCI particles survive th...

2010
Ji Wu Xiao-Lei Zhang Wei Li

This paper presents a new voice activity detection (VAD) framework that is based on the empirical rules and statistical models. First, the VAD framework detects the candidate endpoints efficiently in the time domain with empirical rules which are based on the human knowledge and the nature of the speech continuousness, and then it confirms the candidate endpoints in the transform domain with di...

2017
Ahmet Salih Buyukkayhan Alina Oprea Zhou Li William K. Robertson

Organizations are facing an increasing number of criminal threats ranging from opportunistic malware to more advanced targeted attacks. While various security technologies are available to protect organizations’ perimeters, still many breaches lead to undesired consequences such as loss of proprietary information, financial burden, and reputation defacing. Recently, endpoint monitoring agents t...

2013
Bushi Wang Naitee Ting

Many multiple testing procedures (MTP) have been developed in recent years. Among these new procedures, the graphical approach is flexible and easy to communicate with non-statisticians. A hypothetical Phase III clinical trial design is introduced in this manuscript to demonstrate how graphical approach can be applied in clinical product development. In this design, an active comparator is used...

Journal: :Physical Review D 2014

Journal: :Nursing Management 2018

Journal: :Journal of High Energy Physics 2021

A bstract Following our earlier work we establish kinematic endpoint relations for baryon decays using the Wigner-Eckart theorem and apply them to $$ \frac{1}{2}\to \frac{1}{2} 1 2 → \frac{3}{2} 3 transitions. We provide angular distr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1391

a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید