Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2020

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 4401

Full-Text Articles in Physical Sciences and Mathematics

Inexact Tensor Methods And Their Application To Stochastic Convex Optimization, Artem Agafonov, Dmitry Kamzolov, Pavel Dvurechensky, Alexander Gasnikov, Martin Takac Dec 2020

Inexact Tensor Methods And Their Application To Stochastic Convex Optimization, Artem Agafonov, Dmitry Kamzolov, Pavel Dvurechensky, Alexander Gasnikov, Martin Takac

Machine Learning Faculty Publications

We propose general non-accelerated and accelerated tensor methods under inexact information on the derivatives of the objective, analyze their convergence rate. Further, we provide conditions for the inexactness in each derivative that is sufficient for each algorithm to achieve a desired accuracy. As a corollary, we propose stochastic tensor methods for convex optimization and obtain sufficient mini-batch sizes for each derivative. © 2020, CC BY.


Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong Dec 2020

Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong

Dissertations

A parallel decentralized binary decision fusion architecture employs a bank of local detectors (LDs) that access a commonly-observed phenomenon. The system makes a binary decision about the phenomenon, accepting one of two hypotheses (H0 (“absent”) or H1 (“present”)). The k 1 LD uses a local decision rule to compress its local observations yk into a binary local decision uk; uk = 0 if the k 1 LD accepts H0 and uk = 1 if it accepts H1. The k 1 LD sends its decision uk over a noiseless dedicated channel to a Data Fusion Center (DFC). The DFC combines the …


Drone-Assisted Emergency Communications, Di Wu Dec 2020

Drone-Assisted Emergency Communications, Di Wu

Dissertations

Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …


A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek Dec 2020

A Deep Machine Learning Approach For Predicting Freeway Work Zone Delay Using Big Data, Abdullah Shabarek

Dissertations

The introduction of deep learning and big data analytics may significantly elevate the performance of traffic speed prediction. Work zones become one of the most critical factors causing congestion impact, which reduces the mobility as well as traffic safety. A comprehensive literature review on existing work zone delay prediction models (i.e., parametric, simulation and non-parametric models) is conducted in this research. The research shows the limitations of each model. Moreover, most previous modeling approaches did not consider user delay for connected freeways when predicting traffic speed under work zone conditions. This research proposes Deep Artificial Neural Network (Deep ANN) and …


Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu Dec 2020

Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu

Dissertations

The combination of online shopping and social media allow people with similar shopping interests and experiences to share, comment, and discuss about shopping from anywhere and at any time, which also leads to the emergence of online shopping communities. Today, more people turn to online platforms to share their opinions about products, solicit various opinions from their friends, family members, and other customers, and have fun through interactions with others with similar interests. This dissertation explores how collaborative online shopping presents itself as a context and platform for users' interpersonal interactions and social relationship formation through a series of studies. …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni Dec 2020

Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni

Dissertations

Internet traffic classification or packet classification is the act of classifying packets using the extracted statistical data from the transmitted packets on a computer network. Internet traffic classification is an essential tool for Internet service providers to manage network traffic, provide users with the intended quality of service (QoS), and perform surveillance. QoS measures prioritize a network's traffic type over other traffic based on preset criteria; for instance, it gives higher priority or bandwidth to video traffic over website browsing traffic. Internet packet classification methods are also used for automated intrusion detection. They analyze incoming traffic patterns and identify malicious …


Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu Dec 2020

Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu

Dissertations

Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …


Accelerating Transitive Closure Of Large-Scale Sparse Graphs, Sanyamee Milindkumar Patel Dec 2020

Accelerating Transitive Closure Of Large-Scale Sparse Graphs, Sanyamee Milindkumar Patel

Theses

Finding the transitive closure of a graph is a fundamental graph problem where another graph is obtained in which an edge exists between two nodes if and only if there is a path in our graph from one node to the other. The reachability matrix of a graph is its transitive closure. This thesis describes a novel approach that uses anti-sections to obtain the transitive closure of a graph. It also examines its advantages when implemented in parallel on a CPU using the Hornet graph data structure.

Graph representations of real-world systems are typically sparse in nature due to lesser …


Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil Dec 2020

Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil

Elinvo (Electronics, Informatics, and Vocational Education)

Pengembangan sistem informasi pemasaran produk pertanian (SIPTANI) dibutuhkan untuk membantu para petani dalam memasarkan produk-produk pertanian khususnya di era pandemic Covid-19. Penelitian ini merupakan penelitian pengembangan sistem dengan model pengembangan prototype dengan studi kelayakan menggunakan standar ISO 9126. Data penelitian diperoleh dari hasil observasi dan pengisian kuesioner oleh responden. Hasil pengujian aplikasi diperoleh dengan menganalisis aspek-aspek pada functional suitability, usability, compatibility, dan portability. Pada aspek functional suitability berada pada kategori layak diterima. Pada aspek usability, kategori sangat setuju memiliki dengan persentase 90%, sehingga aplikasi dinyatakan layak dan ditanggapi baik oleh pengguna. Pada aspek compatibility, sistem pemasaran pertanian ini dapat …


Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari Dec 2020

Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari

Elinvo (Electronics, Informatics, and Vocational Education)

Abstract-Supplier selection is one of the important things in purchasing activities for companies. Supplier selection is a multi-criteria problem which includes quantitative and qualitative factors. One method that can be used for supplier selection is the AHP (Analytical Hierarchy Process) method. The problems that will be discussed in this study are: (1) how is the order of priority criteria and sub-criteria in the selection of suppliers at PT Garuda Hidrotive International? (2) which supplier / supplier should PT Garuda Hidrotive International choose based on the AHP method? The sampling technique uses judgment sampling because the AHP method requires dependence on …


Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah Dec 2020

Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah

Elinvo (Electronics, Informatics, and Vocational Education)

Bipartite graph merupakan satu bentuk graph yang dapat digunakan dalam membentuk sebuah strukur data yang saling berelasi namun memiliki karakteristik dengan dua jenis node yang berbeda seperti data hubungan keluarga atau data pohon keluarga. Dalam menyimpan struktur data bipartite graph ke sebuah database dapat digunakan graph database dengan konsep dimana node saling saling terhubung dengan node lainnya. Bipartite graph yang dikombinasikan dengan graph database menghasilkan solusi yang tepat dalam menyimpan data berelasi dengan dua jenis node yang berbeda. Namun dalam solusi tersebut menimbulkan permasalahan baru mengenai pencarian atau penelusuran (traversal) terhadap data yang terdapat dalam struktur data tersebut. Tujuan dari …


Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti Dec 2020

Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti

Elinvo (Electronics, Informatics, and Vocational Education)

Pengelolaan data secara konvensional, baik manual pada buku maupun penggunaan aplikasi pengolah data (kata atau angka) dinilai masih memiliki keterbatasan terutama dalam hal keterjangkauan akses dan pengelolaan. Sistem informasi inventori mampu menyajikan pengelolaan data berupa informasi-informasi yang dibutuhkan untuk produktivitas tempat usaha sesuai karakteristik pengguna informasi pada tempat usaha tersebut. Lebih lanjut untuk proses transmisi data yang lebih baik, diperlukan optimalisasi media penyimpanan melalui teknik kompresi data tertentu. Salah satu algoritma kompresi data teks yang memiliki keunggulan pada optimalisasi ukuran hasil kompresi adalah Goldbach Codes. Artikel ini mendeskripsikan pengembangan sistem pengelolaan inventori dengan kemampuan dapat menyimpan maupun mengubah data stok …


Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir Dec 2020

Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir

Elinvo (Electronics, Informatics, and Vocational Education)

Layanan sistem informasi akademik untuk orang tua (SIORTU) telah banyak diterapkan di kampus-kampus, salah satunya adalah Universitas Islam Indonesia (UII). Nama resmi SIORTU UII yaitu UNISYS untuk orang tua. Belum banyak orang tua atau wali mahasiswa yang menggunakan SIORTU. Tercatat hanya 7.361 akun SIORTU yang aktif pada rentang April 2018 s.d Maret 2019. Jumlah tersebut hanya 36.68% dari jumlah akun yang disediakan untuk orang tua mahasiswa angkatan 2015-2018 yaitu 20.068 akun. Penelitian ini merupakan pengembangan penelitian yang telah dilakukan sebelumnya. Penelitian ini merupakan penelitian kuantitatif. Data yang dianalisis diperoleh dari data penelitian yang dikembangkan. Tujuan penelitian ini adalah mengetahui pengaruh …


Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri Dec 2020

Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri

BAU Journal - Science and Technology

the increasing demand for cloud computing services has led to the adoption of large-scale cloud data centers (DCs) to meet the user’s requirements. Efficiency and managing of such DCs have become a challenging problem. Consequently, energy-efficient solutions to optimize the whole DC energy consumption, optimize the application’s performance and reduce the cloud provider operational cost are crucial and needed. This paper addressed the problem of Virtual Machines (VMs) placement of multi-tier applications to maximize the compute resources utilization, minimize energy consumption, and reduce network traffic inside modern large-scale cloud DCs. The VM placement problem with communication dependencies among the VMs …


Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland Dec 2020

Sensitivity Analysis Of An Agent-Based Simulation Model Using Reconstructability Analysis, Andey M. Nunes, Martin Zwick, Wayne Wakeland

Systems Science Faculty Publications and Presentations

Reconstructability analysis, a methodology based on information theory and graph theory, was used to perform a sensitivity analysis of an agent-based model. The NetLogo BehaviorSpace tool was employed to do a full 2k factorial parameter sweep on Uri Wilensky’s Wealth Distribution NetLogo model, to which a Gini-coefficient convergence condition was added. The analysis identified the most influential predictors (parameters and their interactions) of the Gini coefficient wealth inequality outcome. Implications of this type of analysis for building and testing agent-based simulation models are discussed.


Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott Dec 2020

Distributed Load Testing By Modeling And Simulating User Behavior, Chester Ira Parrott

LSU Doctoral Dissertations

Modern human-machine systems such as microservices rely upon agile engineering practices which require changes to be tested and released more frequently than classically engineered systems. A critical step in the testing of such systems is the generation of realistic workloads or load testing. Generated workload emulates the expected behaviors of users and machines within a system under test in order to find potentially unknown failure states. Typical testing tools rely on static testing artifacts to generate realistic workload conditions. Such artifacts can be cumbersome and costly to maintain; however, even model-based alternatives can prevent adaptation to changes in a system …


Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho Dec 2020

Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho

Master's Projects

Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …


A Neat Approach To Malware Classification, Jason Do Dec 2020

A Neat Approach To Malware Classification, Jason Do

Master's Projects

Current malware detection software often relies on machine learning, which is seen as an improvement over signature-based techniques. Problems with a machine learning based approach can arise when malware writers modify their code with the intent to evade detection. This leads to a cat and mouse situation where new models must constantly be trained to detect new malware variants. In this research, we experiment with genetic algorithms as a means of evolving machine learning models to detect malware. Genetic algorithms, which simulate natural selection, provide a way for models to adapt to continuous changes in a malware families, and thereby …


Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu Dec 2020

Pyxtal_Ff: A Python Library For Automated Force Field Generation, Howard Yanxon, David Zagaceta, Binh Tang, David S. Matteson, Qiang Zhu

Physics & Astronomy Faculty Research

We present PyXtal_FF—a package based on Python programming language—for developing machine learning potentials (MLPs). The aim of PyXtal_FF is to promote the application of atomistic simulations through providing several choices of atom-centered descriptors and machine learning regressions in one platform. Based on the given choice of descriptors (including the atom-centered symmetry functions, embedded atom density, SO4 bispectrum, and smooth SO3 power spectrum), PyXtal_FF can train MLPs with either generalized linear regression or neural network models, by simultaneously minimizing the errors of energy/forces/stress tensors in comparison with the data from ab-initio simulations. The trained MLP model from PyXtal_FF is interfaced with …


Signature Identification And Verification Systems: A Comparative Study On The Online And Offline Techniques, Nehal Hamdy Al-Banhawy, Heba Mohsen, Neveen I. Ghali Prof. Dec 2020

Signature Identification And Verification Systems: A Comparative Study On The Online And Offline Techniques, Nehal Hamdy Al-Banhawy, Heba Mohsen, Neveen I. Ghali Prof.

Future Computing and Informatics Journal

Handwritten signature identification and verification has become an active area of research in recent years. Handwritten signature identification systems are used for identifying the user among all users enrolled in the system while handwritten signature verification systems are used for authenticating a user by comparing a specific signature with his signature that is stored in the system. This paper presents a review for commonly used methods for preprocessing, feature extraction and classification techniques in signature identification and verification systems, in addition to a comparison between the systems implemented in the literature for identification techniques and verification techniques in online and …


Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko Dec 2020

Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko

Journal of Sustainable Mining

The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …


Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao Dec 2020

Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao

Articles

It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …


Multi-Agent Deep Reinforcement Learning For Walkers, Inhee Park Dec 2020

Multi-Agent Deep Reinforcement Learning For Walkers, Inhee Park

Master's Projects

This project was motivated by seeking an AI method towards Artificial General Intelligence (AGI), that is, more similar to learning behavior of human-beings. As of today, Deep Reinforcement Learning (DRL) is the most closer to the AGI compared to other machine learning methods. To better understand the DRL, we compares and contrasts to other related methods: Deep Learning, Dynamic Programming and Game Theory.

We apply one of state-of-art DRL algorithms, called Proximal Policy Op- timization (PPO) to the robot walkers locomotion, as a simple yet challenging environment, inherently continuous and high-dimensional state/action space.

The end goal of this project is …


End-To-End Learning Utilizing Temporal Information For Vision- Based Autonomous Driving, Dapeng Guo Dec 2020

End-To-End Learning Utilizing Temporal Information For Vision- Based Autonomous Driving, Dapeng Guo

Master's Projects

End-to-End learning models trained with conditional imitation learning (CIL) have demonstrated their capabilities in driving autonomously in dynamic environments. The performance of such models however is limited as most of them fail to utilize the temporal information, which resides in a sequence of observations. In this work, we explore the use of temporal information with a recurrent network to improve driving performance. We propose a model that combines a pre-trained, deeper convolutional neural network to better capture image features with a long short-term memory network to better explore temporal information. Experimental results indicate that the proposed model achieves performance gain …


Lidar Object Detection Utilizing Existing Cnns For Smart Cities, Vinay Ponnaganti Dec 2020

Lidar Object Detection Utilizing Existing Cnns For Smart Cities, Vinay Ponnaganti

Master's Projects

As governments and private companies alike race to achieve the vision of a smart city — where artificial intelligence (AI) technology is used to enable self-driving cars, cashier-less shopping experiences and connected home devices from thermostats to robot vacuum cleaners — advancements are being made in both software and hardware to enable increasingly real-time, accurate inference at the edge. One hardware solution adopted for this purpose is the LiDAR sensor, which utilizes infrared lasers to accurately detect and map its surroundings in 3D. On the software side, developers have turned to artificial neural networks to make predictions and recommendations with …


Detecting Deepfakes With Deep Learning, Eric C. Tjon Dec 2020

Detecting Deepfakes With Deep Learning, Eric C. Tjon

Master's Projects

Advances in generative models and manipulation techniques have given rise to digitally altered videos known as deepfakes. These videos are difficult to identify for both humans and machines. Typical detection methods exploit various imperfections in deepfake videos, such as inconsistent posing and visual artifacts. In this paper, we propose a pipeline with two distinct pathways for examining individual frames and video clips. The image pathway contains a novel architecture called Eff-YNet capable of both segmenting and detecting frames from deepfake videos. It consists of a U-Net with a classification branch and an EfficientNet B4 encoder. The video pathway implements a …


Image Spam Classification With Deep Neural Networks, Ajay Pal Singh, Katerina Potika Dec 2020

Image Spam Classification With Deep Neural Networks, Ajay Pal Singh, Katerina Potika

Faculty Publications, Computer Science

Image classification is a fundamental problem of computer vision and pattern recognition. We focus on images that contain spam. Spam is unwanted bulk content, and image spam is unwanted content embedded inside the images. Image spam potentially creates a threat to the credibility of any email-based communication system. While a lot of machine learning techniques are successful in detecting textual based spam, this is not the case for image spams, which can easily evade these textual-spam detection systems. In our work, we explore and evaluate four deep learning techniques that detect image spams. First, we train deep neural networks using …


Findfur: A Tool For Predicting Furin Cleavage Sites Of Viral Envelope Substrates, Christine Gu Dec 2020

Findfur: A Tool For Predicting Furin Cleavage Sites Of Viral Envelope Substrates, Christine Gu

Master's Projects

Most biologically active proteins of eukaryotic cells are initially synthesized in the secretory pathway as inactive precursors and require proteolytic processing to become functionally active. This process is performed by a specialized family of endogenous enzymes known as proproteases convertases (PCs). Within this family of proteases, the most notorious and well-research is furin. Found ubiquitously throughout the human body, typical furin substrates are cleaved at sites composed of paired basic amino acids, specifically at the consensus sequence, R-X-[K/R]-R↓. Furin is often exploited by many pathogens, such as enveloped viruses, for proteolytic processing and maturation of their proteins. Glycoproteins of enveloped …


Malware Classification With Gaussian Mixture Model-Hidden Markov Models, Jing Zhao Dec 2020

Malware Classification With Gaussian Mixture Model-Hidden Markov Models, Jing Zhao

Master's Projects

Discrete hidden Markov models (HMM) are often applied to the malware detection and classification problems. However, the continuous analog of discrete HMMs, that is, Gaussian mixture model-HMMs (GMM-HMM), are rarely considered in the field of cybersecurity. In this study, we apply GMM-HMMs to the malware classification problem and we compare our results to those obtained using discrete HMMs. As features, we consider opcode sequences and entropy-based sequences. For our opcode features, GMM-HMMs produce results that are comparable to those obtained using discrete HMMs, whereas for our entropy-based features, GMM-HMMs generally improve on the classification results that we can attain with …