The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative Virtual Environments (CVE) with co-located or remote video communication functionality require a continuous experience of social presence. If, at any stage during the experience the communication interrupts presence, then the CVE experience as a whole is affected — spatial presence is then decoupled from social presence. We present a solution to this problem by introducing the concept...
Educational software has frequently been criticized as it has not been explicitly planned to meet the demands of educational environment. Therefore, there is an increasing demand for an intelligent computer technology to become used in the environment of education. This paper proposes the development of an intelligent tutoring system, which will aid students to learn software development. The idea...
In this paper, we investigated the use of Learning Vector Quantization (LVQ) for phoneme transcription in Arabic speech recognition systems. We used Arabic speech corpus of TV news clips. Then, we employed feature vectors, which embed the frame neighboring correlation information between adjacent phonemes to replace the traditional trip hones models. Next, we generated the phonemes codebooks using...
Continuous Arabic Speech Recognition, appears in many real life applications. Its speed, accuracy and improvement are highly dependent on the accuracy of the language phonemes set. The main goal of this research is to recognize and transcribe the Arabic phonemes based on a data-driven approach. We built a phoneme recognizer based on a data driven approach using HTK tool. Different numbers of Gaussian...
Terrorist group's forums remain a threat for all web users. It stills need to be inspired with algorithms to detect the informative contents. In this paper, we investigate most discussed topics on Arabic Dark Web forums. Arabic Textual contents extracted from selected Arabic Dark Web forums. Vector Space Model (VSM) used as text representation with two different term weighing schemas, Term Frequency...
In recent years there has been an increasing interest in speech and language processing systems dedicated to Arabic language. In order to perform adequate design and evaluation of those systems, speech databases are needed. The aim of this paper is to evaluate the design of Arabic and English speech recognition systems by using common acoustic models. Cross-language experiments between Arabic and...
Steady improvements in storage capacities and CPU clock speeds intensify the performance bottleneck at the I/O subsystem of modern computers. Caching data can efficiently short circuit costly delays associated with disk accesses. Recent studies have shown that disk I/O performance gains provided by a cache buffer do not scale with cache size. Therefore, new algorithms have to be investigated to better...
Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets with energy constraints. To remedy this problem, I present in this paper an approach to scheduling periodic packets in wireless networks subject to both timing and energy constraints. I propose a necessary and sufficient...
In this paper, we present our first work in the ??computerized teaching of the Holly Quran?? project, which aims to assist the memorization process of the Noble Quran based-on the speech recognition techniques. In order to build a high performance speech recognition system for this purpose, accurate acoustic models are essentials. Since annotated speech corpus of the Quranic sounds was not available...
High performance clusters have been widely used to provide amazing computing capability for both commercial and scientific applications. However, huge power consumption has prevented the further application of large-scale clusters. Designing energy-efficient scheduling algorithms for parallel applications running on clusters, especially on the high performance heterogeneous clusters, is highly desirable...
Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets with energy constraints. To remedy this problem, we present in this paper an approach to scheduling periodic packets in wireless networks subject to both timing and energy constraints. We propose a necessary and sufficient...
Speaker verification is concerned with verifying the speakerpsilas claimed identity. This paper reports on recent experiments we carried out for speaker verification using a Saudi accented Arabic telephone speech database with 1033 speakers. Gaussian Mixture Model was employed in these experiments. In speaker verification, users might produce two or more utterances. We show that we can reduce error...
Since security is of critical importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increasing number of secure storage systems have been developed, there is no way to dynamically choose security services to meet disk requests' flexible security requirements. Furthermore, existing security techniques for disk systems are not suitable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.