Ledum Atu - Academia.edu (original) (raw)

Related Authors

Noel B.  Salazar

Andreas Umland

Oludamini Ogunnaike

Armando Marques-Guedes

Elena Loizidou

Roshan Chitrakar

Lev Manovich

Lev Manovich

Graduate Center of the City University of New York

Mauro Grondona

Nicola Lupo

Rafael Domingo Osle

Uploads

Papers by Ledum Atu

Research paper thumbnail of Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.

Research paper thumbnail of A Model to Detect Network Intrusion Using Machine Learning

The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...

Research paper thumbnail of A Deep Learning Framework for Human Activity Recognition Using Smartphone Data

Research paper thumbnail of Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.

Research paper thumbnail of A Model to Detect Network Intrusion Using Machine Learning

The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...

Research paper thumbnail of A Deep Learning Framework for Human Activity Recognition Using Smartphone Data

Log In