The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a text independent speaker recognition system based on Gaussian mixture models (GMM) was developed with a specific focus on the use of a voice activated detector (VAD) algorithm in the training and testing. At the training level, a modified estimation/maximization (EM) algorithm is used. It is less prone to get trapped around a local maximum and so, it will have more chance to converge...
Outlier detection is a primary step in many data mining applications. An outlier is an abnormal individual from a population, which usually leads poor accuracy in models. Medical literatures are the most reliable resources for researchers to know the progress in their research areas and latest contributions from others. Traditional keyword search retrieves all the text data that contain the keywords...
Fraud, waste, and abuse in medical insurance contributes to significant increases in costs for providers and patients. One way to reduce costs is through the detection of abnormal medical practices that could indicate possible fraud. In this paper, we expand upon our previous research into medical specialty anomaly detection by validating the efficacy of our model using real-world fraud cases, and...
Mobile app testing and evaluation requires exposing the app to a wide array of real world context conditions viz. location, sensor values, network conditions etc. Such comprehensive context conditions are difficult to create in a development environment on a real device, therefore, simulating them in a mobile emulator is a promising alternative. We present ContextMonkey, a framework for context generation...
Big data applications (e.g., Extract, Transform, and Load (ETL) applications) are designed to handle great volumes of data. However, processing such great volumes of data is time-consuming. There is a need to construct small yet effective test data sets during agile development of big data applications. In this paper, we apply a combinatorial test data generation approach to two real-world ETL applications...
Plankton image classification plays an important role in the ocean ecosystems research. Recently, a large scale database for plankton classification with over 3 million images annotated with over 100 classes was released. However, the database suffers from imbalanced class distribution in which over 90% of images belong to only 5 classes. Due to this class-imbalance problem, the existing classification...
This work projects the importance of phonetic match between train and test session for a text-independent framework under limited test data condition. The robustness of text-independent speaker verification (SV) tends to fall down with the reduction of the amount of speech involved. From a deployable application oriented system point of view, the amount of speech involved, is expected to be less to...
Biometrics are being used as one of many alternatives in Recognition System. Palm vein is one of many features that could be used in biometrics. Several advantages of palm vein is that they were not easily damaged and rather hard to be duplicated because it is located deep inside skin layers. Palm vein is also cannot be seen with plain eyes or ordinary cameras. The research in this biometrics recognition...
Digital news will continue to grow up and evolve, it bring up the new issue for modeling digital news data that are stored in the database so that it is easier to understand and be able to take some important information thoroughly. To simplify the information processing in the database it is require a model and a specific method for clustering the news based on proximity and characteristics of the...
The main goal of the work presented in this paper was to develop a set of algorithms which allows to predict what will be the probability ratio of acquisition of the items form the given database. To fulfill this goal, the appropriate statistical methods were developed, mainly using R programming language. In order to apply the specific statistical methods, the appropriate database preprocessing was...
SQL Injection Attack (SQLIA) has been consistently ranked among the top security threats against web applications for more than a decade. Nowadays, attackers use sophisticated tools to launch automated injection attacks. The problem of prevention and detection of SQLIA has been long attended by the research community, but hardly any solution exists for protecting multiple websites in a shared hosting...
Much more information itself needs information about information. Since last twenty years, data scientists are working on Big Data and its analytics. We already covered a long distance in all verticals of Big Data but cloud based software testing. Big Data analytics is based on 5 V's and analytical results may sometime generate unwanted data for the financial forecasters. Cloud computing plays a crucial...
The success of web services is changing the way in which software is designed, developed, and distributed. Services are in fact continuously re-designed and incrementally developed, released in heterogeneous and distributed environments. They are selected and integrated at runtime within external business processes. To ensure that a deployed service fulfils the QoS requirements, a Service Level Agreement...
Many Organizations depend on Web Applications for performing various activities and stores the collected details in the database. Testing of the database is done to ensure the correctness for the design and working of the database. This paper performs testing of database design for the application using the Entity Relationship diagram for various components used in the database, the model is generated...
Ground testing for the flight software of the Alpha Magnetic Spectrometer (AMS) requires a virtual environment which processes commands from real controllers and provides normal or abnormal signals as needed. We introduced the hardware-in-the-loop (HIL) concept but implemented the simulation in an innovative way that skips mathematical modeling. A simulation database derived from the real-time flight...
Model-Based Testing (MBT) is a method for automating software testing and improving fault detection by using an abstracted model of the system under test to systematically generate and execute test cases. One of the main challenges in MBT is the efficient locating of fundamental causes of errors, which can be achieved using root cause analysis. As MBT is being applied to many diverse domains using...
Testing data-intensive systems is paramount to increase our reliance on information processed in e-governance, scientific/ medical research, and social networks. A common practice in the industrial testing process is to use test databases copied from live production streams to test functionality of complex database applications that manage well-formedness of data and its adherence to business rules...
Virtual organisations and product modelling represents domains with significant developments since mid 1990's. Various techniques developed under the scope of Mechanical Engineering Systems leads to the need of an integrated multi-view model concept. The paperwork presents the findings of a study for a PDM application proposed to be used for virtual organisations. Models of product, organisation and...
Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal with targeted attacks. This kind of attacks are specifically designed to stay below the radar of standard ICT security systems. As a consequence, vendors have begun to ship self-learning intrusion detection systems with sophisticated heuristic...
The advantages of web applications have already got attention in major physical research facilities like Canadian Light Source (CLS). It is the accessability of web applications that makes them preferred to native desktop application in some experimental control scenarios. This short paper presents two web applications that were mainly developed at CLS — Science Studio for remote access and collaboration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.