Ledum Atu - Profile on Academia.edu (original) (raw)

Beat Signer related author profile picture

Andreas Umland related author profile picture

Benjamin Isakhan related author profile picture

Oludamini Ogunnaike related author profile picture

Armando Marques-Guedes related author profile picture

Martin O'Neill related author profile picture

Jodi Dean related author profile picture

Lev Manovich related author profile picture

Lev Manovich

Graduate Center of the City University of New York

Harris Mylonas related author profile picture

Cosmin Sebastian Cercel related author profile picture

Uploads

Papers by Ledum Atu

Research paper thumbnail of Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.

Research paper thumbnail of A Model to Detect Network Intrusion Using Machine Learning

The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...

Research paper thumbnail of A Deep Learning Framework for Human Activity Recognition Using Smartphone Data

IJARCCE, 2021

Smart phones are the most helpful apparatuses of our day-by-day life and with the propelling inno... more Smart phones are the most helpful apparatuses of our day-by-day life and with the propelling innovation; they get fit systematically to address user's issues and desires. To make these contraptions more useful and amazing, originators add new modules and gadgets to the equipment. Sensors has a major part in making cell phones more practical and mindful of the climate subsequently most smart phones accompany distinctive inserted sensors and this makes it conceivable to gather tremendous measures of data about the client's day by day life and exercises. The goal of Human Activity Recognition is to identify the activities performed by an individual from a given set of the information about him/her and his general environment. A great deal of exploration is being done in the field of Human Activity Recognition which human conduct is deciphered by reasoning highlights got from development, place, physiological signs and data from environments. The propose system presents a deep learning framework for human activity recognition using a smartphone data. The dataset was downloaded from kaggle.com. The dataset contains accelerometer and gyroscope data gotten from a Samsung Galaxy S2 smartphone. The accelerometer and gyroscope data is made up of different activities performed by an individual. The propose system uses keras framework and Theano as backend in build our model. After successful training, the proposed method had an accuracy of 99.06% on the 120 th epoch.

Research paper thumbnail of Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Assisting the Speech Impaired People Using Text-to-Speech Synthesis

Many people have some sort of disability which impairs their ability to communicate, thus with al... more Many people have some sort of disability which impairs their ability to communicate, thus with all their intelligence they are not able to participate in conferences or meeting proceedings and consequently inhibit in a way their contributions to development of the nation. Work in alternative and augmentative communication (AAC) devices attempts to address this need. This paper tries to design a system that can be used to read out an input to its user. The system was developed using Visual Basic6.0 for the user interface, and was interfaced with the Lemout & Hauspie True Voice Text-to-Speech Engine (American English) and Microsoft agent. The system will allow the users to input the text to be read out, and also allows the user to open text document of the Rich Text Formant (.rtf) and Text File format (.txt) that have been saved on disk, for reading.

Research paper thumbnail of A Model to Detect Network Intrusion Using Machine Learning

The attacks on computer security are becoming global and it is a very important security threats ... more The attacks on computer security are becoming global and it is a very important security threats issues to the cyberspace, that if an organization is not mindful of, important data will be accessed, modified, or deleted. Computer security attackers utilize the compulsions and security weaknesses in the computer network and data system to carry out an attack, which ideals the divulgence of system information and the capture of the privacy of users and threaten data availability or integrity. The proposed system aim in developing a model to detect network intrusion using machine learning algorithm. The dataset consists of different categories of intrusions stimulated in a military environment. The dataset consists of a raw TCP/IP data for a network by stimulating a typical US Air Force Lan. The dataset is made up of 41 Columns. The class column consists of two types, which are Normal Network Packets and Anomalous Network Packets. The dataset was preprocessed by converting some feature...

Research paper thumbnail of A Deep Learning Framework for Human Activity Recognition Using Smartphone Data

IJARCCE, 2021

Smart phones are the most helpful apparatuses of our day-by-day life and with the propelling inno... more Smart phones are the most helpful apparatuses of our day-by-day life and with the propelling innovation; they get fit systematically to address user's issues and desires. To make these contraptions more useful and amazing, originators add new modules and gadgets to the equipment. Sensors has a major part in making cell phones more practical and mindful of the climate subsequently most smart phones accompany distinctive inserted sensors and this makes it conceivable to gather tremendous measures of data about the client's day by day life and exercises. The goal of Human Activity Recognition is to identify the activities performed by an individual from a given set of the information about him/her and his general environment. A great deal of exploration is being done in the field of Human Activity Recognition which human conduct is deciphered by reasoning highlights got from development, place, physiological signs and data from environments. The propose system presents a deep learning framework for human activity recognition using a smartphone data. The dataset was downloaded from kaggle.com. The dataset contains accelerometer and gyroscope data gotten from a Samsung Galaxy S2 smartphone. The accelerometer and gyroscope data is made up of different activities performed by an individual. The propose system uses keras framework and Theano as backend in build our model. After successful training, the proposed method had an accuracy of 99.06% on the 120 th epoch.

Log In