The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A dual-microphone noise reduction method based on the coherence function for mobile communications is suggested in this paper. The proposed algorithm exploits the Kalman filter and the spectral subtraction method in order to improve the speech quality in different noisy environments. The adopted method is easy to implement and needs no estimation of interfering signals statistics. The proposed algorithm...
Human machine interaction becomes one of the most research topics in multimedia processing, traditional techniques for communication are developed in order to tackle technology advances and allow disable person to communicate easily with the machine, and to understand their activity using computer computing. In this paper we are focused on human behavior analysis from video scene and it is worth noticed...
The paper considers a class of symmetric Boolean functions called Reed-Muller type Fundamental Symmetric Functions, it reviews some of their properties and presents some new ones. The main contribution of the paper is a proof that the Reed-Muller transform of a symmetric Boolean function is also symmetric and that of a rotation symmetric Boolean function is also rotation symmetric. Since symmetric...
This paper presents a system for spoken term detection in a continuousspeech stream. Spoken terms are predefined through a set of acoustic examples provided by the users. Spoken term detection proceeds in two steps: speech segmentation and term verification. We suggest the use of an acoustic-based algorithm for the segmentation which exploits acoustic particularities of the speech stream to detect...
Recently there has been an increasing interest in transformerless photovoltaic (PV) inverters because of their salient benefits such as lower cost, smaller volume as well as higher efficiency as compared to those with transformer. However, a higher leakage current will inherently flow from the PV array to the grid through the stray capacitance. The leakage current increases the losses as well as the...
In this paper the method of dynamical properties of flow in some eye vessels is described. It is based on algorithm of segmentation on base CNN, morphological processing and optical flow. It allows to define new properties of changing blood flow in vessels that is depends from structure of vessels net.
Autism spectrum disorder (ASD) is one of the most popular disorders. Many researches and experiments in the world have been conducted to study causes of ASD. It has been proved that ASD is associated with elevated concentrations of homocysteine and low concentrations of cerebral folic acid. Being part of a complex biological system, we can model it to study its behaviour relatively to metabolic causes...
First of all, the railway traffic control process should ensure the safety. One of the current research areas is to ensure the security of data in the distributed rail traffic control systems using wireless networks. Emerging security threats are the result of, among others, an unknown number of users who may want to access the network, and an unknown number and type of equipment that can be connected...
There are several well-known corpus management systems (Sketch Engine, Manatee, EXMARaLDA, etc.). The system presented in this article has search functionalities comparable to those. However, it also takes into account certain specifics of Turkic languages.
Cells in a shear flow exhibit tumbling and tank-treading. This rotational movement is characterized by rotational frequency. In this work, we analyze and test a computational model of red blood cell by comparing simulated movement of a cell in a shear flow to the experimental data. We set up a computational experiment that recasts dynamical behavior of cells in a shear flow. We analyze the dependence...
Electromagnetic interference such as crosstalk are big problem for the control of components in power electronics. In this work, a new approach for reducing parasites coupling between coupled transmission lines employed in power electronics is presented. We proposed a new method for crosstalk reduction in PCB cards. This method is to add a tee guard line (TGL), between the coupled microstrip lines...
The topical information security problem of development of statistical tests for hypotheses on the discrete uniform distribution (“pure randomness”) of output sequences produced by random or pseudorandom generators is considered. For Shannon, Rényi and Tsallis entropy functionals, the point statistical estimators based on the plug-in principle are constructed. The asymptotic probability distributions...
Trust assessment is a fundamental concept in the context of collaboration for large scale IoT systems. How to represent and measure appropriately the trust is a pursuit of many researchers. Many tasks, such as encryption and signature, can be accomplished perfectly by a collaborative process when a trust metric is well-defined. Trust is a widely used metric that is both effective and significative...
In the paper, we consider the problem of automatic transformation of unstructured data included in real-estate listings into data arranged in a tabular form, as the so-called information tables. Transformation is an important preprocessing stage enabling us to obtain data in a form accepted by many data mining and machine learning tools. In the presented approach, information tables represent information...
Efficiency of mobile investigation process (Smartphone Forensics) is associated with its evidence analysis phase. This phase rests on collection and location of all evidence and their temporal, functional and relational combinations. High volume of these sets evidence, its complexity and size of relations between the different data types may complicate the evidence analysis phase and crime reconstruction...
Last years research gave some preliminary results in approaches to customer online purchase prediction. However, it still remains unclear what exact set of features of data instances should be incorporated in a model and is enough for prediction, what is the best data mining method (algorithm) to use, how stable over time could be such a model, whether a model is transferable from one online store...
Spatial data are very important for assuring quality of decision-making. Satellite images are used in many applications as a source of spatial data. Precise knowledge of number of usable (suitable) satellite images suitable for analyses is important. Statistics can be used to predict number of suitable images for a particular time period The determination which images are suitable enough for analysis...
Extracting knowledge from text data and taking its full advantage has been an important way to reduce its computation and accelerate processing, especially for large amounts of data. Thus, different approaches and methodologies for modeling and representing textual data have been proposed. In this paper, a graph-based approach for automatic indexing of unstructured data from an Arabic corpus has been...
The paper deals with developed and experimentally tested effective synchronization and power control techniques for grid-connected converter. A new FLL (Frequency Locked Loop) technique is developed that incorporates advantages of both the cascaded delayed signal cancellation and dual second order generalized integrator schemes. Experimental results are evaluated in terms of quality of the positive...
In a pedestrian simulation models, the waiting for service represents special behaviour that should be carefully modelled. This paper presents an approach to the modelling of queuing behaviour of pedestrians with no modifications to the movement model. The queuing behaviour of a pedestrian is defined on the tactical layer of pedestrian's reasoning, leaving the operational movement model intact. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.