作者:
Mingzhang Zuo;Lixiang Gao;Wei Wang;Shuang Wang;Heng Luo
期刊:
International Journal of Innovation and Learning,2022年31(3):404-422 ISSN:1471-8197
通讯作者:
Luo, H.
作者机构:
[Mingzhang Zuo; Lixiang Gao; Shuang Wang; Heng Luo] School of Educational Information Technology, Central China Normal University, Wuhan, China;[Wei Wang] Hangcheng Elementary and Middle School, Shenzhen, China
通讯机构:
School of Educational Information Technology, Central China Normal University, Wuhan, China
期刊:
International Journal of Information and Education Technology,2019年9(3):178-183 ISSN:2010-3689
通讯作者:
Wang, Z.
作者机构:
School of Educational Information Technology, Central China Normal University, Wuhan, Hubei 430079, China;School of Computer, Central China Normal University, Wuhan, Hubei 430079, China
通讯机构:
School of Educational Information Technology, Central China Normal University, Wuhan, Hubei, China
摘要:
This paper addresses a method of automatic detection of digital audio signal tampering based on feature fusion. Aiming at the insertion and deletion operations in the digital audio signal tamper chain. In this paper, the Electric Network Frequency (ENF) component of the digital audio signal is extracted and the consistency of the ENF component is analyzed to determine whether the audio signal is tampered with. In this paper, a general framework for passive tamper detection of audio signal based on ENF component consistency and a general framework for ENFC feature extraction are proposed. The feature set is used to quantify the amplitude of the phase and instantaneous frequency variations of the ENF component and to serve as an indicator of the consistency of the ENF component. SVM classifier is used to classify the extracted feature sets. The experimental results show that this method can classify the original signal and the edit signal which is inserted and deleted.
期刊:
2010 International Conference on Computational Intelligence and Software Engineering,2010年:1-4
作者机构:
[Lingju Zeng; Mingzhang Zuo; Xiangli Lu] Information and Technology Department, Central China Normal University, Wuhan, China
会议名称:
2010 International Conference on Computational Intelligence and Software Engineering
会议时间:
December 2010
会议地点:
Wuhan, China
会议论文集名称:
2010 International Conference on Computational Intelligence and Software Engineering
摘要:
Interactive Educational Mode which emphasizes various kinds of actions during teaching process is targeted at cultivating students' discovery, analyzing and solving problem, improving autonomous learning ability and fostering the mode of incentive thinking, in a large extent, it embodies the "double-subject" position. However, as a new information technological tool, electronic interactive whiteboard has been concerned by lots of experts and scholars for its powerful interactive function. Therefore, for improving the instructional quality and reforming the educational mode, it has an important significance that how to apply interactive whiteboard to Interactive Classroom Teaching.
作者机构:
[Xia Zhang; Mingzhang Zuo; Qiang Liu] Department of Information Technology, Central China Normal University, Wuhan, Hubei, China
会议名称:
2008 3rd International Conference on Innovative Computing Information and Control
会议时间:
June 2008
会议地点:
Dalian, China
会议论文集名称:
2008 3rd International Conference on Innovative Computing Information and Control
摘要:
Nowadays, Internet goes deep into human beings' daily routines and brings us many remarkable conflicts between mass digital information and our limited capabilities of acquiring them. Search engine thus becomes an important channel of obtaining information. But conventional search engines can index less than 16% of the publicly indexable Webs, and the other 84% are "invisible". Moreover, the public information on the Invisible Web is 400-550 times larger than WWW. Thus users are searching only 0.03% of available pages. Therefore, it's urgent to seek efficient methods to solve the retrieval problem of Invisible Web. This thesis elaborates the reasons why Invisible Web is invisible, puts forward several effective strategies of hunting up invisible resources, and expects to bring human beings enlightenment in network information retrieval and utilization.