Deep convolutional neural network based secure wireless voice communication for underground mines

被引:4
作者
Dey, Prasanjit [1 ]
Kumar, Chandan [1 ]
Mitra, Mitrabarun [1 ]
Mishra, Richa [1 ]
Chaulya, S. K. [1 ]
Prasad, G. M. [1 ]
Mandal, S. K. [1 ]
Banerjee, G. [1 ]
机构
[1] CSIR Cent Inst Min & Fuel Res, Barwa Rd, Dhanbad 826001, Bihar, India
关键词
Convolutional auto-encoder; Deep convolutional neural network; Underground mine; VoIP; Wireless communication; SAFETY;
D O I
10.1007/s12652-020-02700-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A secure wireless voice communication system for underground miners is an essential gadget for efficient and safe mining. Voice over internet protocol is a proven solution for wireless communication in underground mines where other cellular and satellite networks cannot be deployed. However, the wireless network's security is the major issue for the reliable operation of the system. A secure voice communication system has been developed by integrating voice over internet protocol system and deep convolutional neural network (DCNN) based trained model. Experimental results indicated that voice recognition accuracy of the DCNN based developed model was 93.7% for the noiseless environment. In contrast, it was 82.1 and 79% for the existing K-nearest-neighbour (KNN) and support vector machine (SVM) algorithms, respectively. Voice recognition response time of the DCNN, KNN, and SVM algorithms was 178, 220, and 228 ms, respectively. Thus, deployment of the developed secure and robust voice communication system would improve safety and productivity in underground mines.
引用
收藏
页码:9591 / 9610
页数:20
相关论文
共 46 条
[1]  
[Anonymous], 2012, INT J COMPUT APPL
[2]  
[Anonymous], 2016, Audio texture synthesis and style transfer
[3]  
Aoyagi S, 2019, NUTRITION AND ENHANCED SPORTS PERFORMANCE: MUSCLE BUILDING, ENDURANCE, AND STRENGTH, 2ND EDITION, P239, DOI 10.1016/B978-0-12-813922-6.00020-5
[4]  
Ardila D, 2016, P INT SOC MUS INF RE, P7
[5]   Workplace hazard identification and management: The case of an underground mining operation [J].
Bahn, Susanne .
SAFETY SCIENCE, 2013, 57 :129-137
[6]  
Chauhan N, 2019, 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), P130, DOI [10.1109/ccoms.2019.8821751, 10.1109/CCOMS.2019.8821751]
[7]  
Chorowski J, 2015, ADV NEUR IN, V28
[8]  
Chorowski J, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P2256, DOI 10.1109/ICASSP.2018.8461282
[9]   Issues and challenges in securing VoIP [J].
Dantu, Ram ;
Fahmy, Sonia ;
Schulzrinne, Henning ;
Cangussu, Joao .
COMPUTERS & SECURITY, 2009, 28 (08) :743-753
[10]  
Dewi SP, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), P86, DOI [10.1109/iotais47347.2019.8980389, 10.1109/IoTaIS47347.2019.8980389]