The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human Gait Recognition is typically alluded to imply the human ID by the style/way individuals stroll in picture sequences. Our point is to execute the customary gait recognition calculation and to demonstrate the variety in recognition when subject is watched parallel to camera under three conditions-walking slow, at typical speed and walking quickly. For this situation, the work devises a novel...
Biometric identification verifies user identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. The benefit of energy compaction of transforms in higher coefficients is taken here to reduce the...
Easy and open development environments of Android make itself not only as the most famous platform in the world but also as the most preferred platform for malicious users. In this paper, we propose a new approach to protect the private phone number data in smartphones from leaking and stealing through malicious applications. Our approach differently deals with trusted and suspicious applications...
The Information technology (IT) plays a key role in the functioning of the modern era. The evolution of computer is very fast. It improves the efficiency of processing, the capacity of memory and the transmission rate of network. The procurement department will procure the new resources. They did not know that equipment suit any budget because they may not track changes or the development of a computer...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
The universities educational management System is a typical information management system, including the establishment and maintenance of backstage database and the development of frontstage application program. For the former, it requires a database of data consistency and integrity to build strong, full and good, and for the latter procedure, it requires full-functioned and easy to use and so on...
Arabic is one of the most widely spoken languages in the world, but little attention has been paid to detect pronunciation errors of non-Arabs from different nationalities. In this paper, the speech of four nationalities of Asian non-Arabs speaking different mother languages is analyzed to identify their pronunciation errors while learning Arabic as a foreign language. Two human experts have evaluated...
This paper presents a solution for the small and medium-sized enterprise Product Data Management system. Design a Product Data Management system for small-and-medium enterprises of certain industry, which bases on the requirement of information management. The paper analysis the system developing platform and the B/S system architecture which base on. Net framework. Also, the paper describes the main...
The requirement and characteristic in Computer Generated Forces behavior modeling were analyzed. From the design concept of American OneSAF system, a method for behavior modeling based on composability was proposed and the formalization description of behavior was given. Moreover, the Behavior Modeling Composer Tool was developed based on this method to assist the behavior modeling. Finally, an application...
With the deepening research on Mongolian lexical semantic, the construction of Mongolian lexical semantic network has become the bright and hot spots in which the current scholars study, in recent years, many scholars have explored much in Mongolian Noun semantic and made great academic achievements, in view of the fact that the urgent need of Mongolian semantics knowledge research, the research on...
As patients become more proactive about their health and turn to technologies such as the Internet to acquire knowledge, the patient-health care professional relationship has been changing. Traditionally, information has flowed from health care professional to patient, but change to a two-way dialogue is taking place. In this study, we examine a high level design of a perceived medical system and...
This paper introduces the present development and situation of computer games, especially in connect6. Through the regulations of computer games in connect6, it is described that main technologies and principles are existing in the connnect6 game. According to the algorithm and application of other mature computer games, the five steps of connect6 method and skill is improved to be advanced and modified...
As the use and demand for computers are growing so fast, it is very important that every student today acquire computer basic training. Computer literacy will give them all the benefits and advantages to progress their education and future career too. Sudanese students start learning computers at high secondary school. The computer science curriculum at the Sudanese high secondary schools aims at...
Knapsack problems range over a large sphere of real world challenges [?]. For example, every year a professor has to decide her new “squad” of students/staff from possibly hundreds of candidates, while having a restricted budget of funding in consideration. Moreover, in many cases, she has to resort to her colleagues and senior students to make comparisons among the candidates. The difficulties of...
In this paper, the concept for a radio frequency identification (RFID) enabled student workbook is discussed and a prototype system developed. The workbook is a question-answer notebook in traditional paper format in which hand written solutions to student assignments are written. An embedded RFID tag in the workbook is then used for the student to store his/her solution to the attempted assignment...
Script identification is a complex real life problem for automation of printed or handwritten document processing. The task becomes more challenging when it comes about a multi script/lingual country like India. For the development of OCR for a particular language the script needs to be identified first. That is why development of a script identification system is a pressing need. Till date no such...
This paper explores the use of mismatch condition in speaker variability applied to Automatic Speaker Verification (ASV) defined as a classification task to decide whether a proclaimed identity is true or not. This paper proposes to model mismatch conditions in speaker variability from session to another. It was shown that the speaker recognition accuracy deteriorates when there is an acoustic mismatch...
In order to improve the level of higher education support services and enhance their ability to participate in social competition, based on modern information technology and network multimedia technology, to establish a logistics service network support systems on ISO9001 certification, is to achieve modernization of university management system certification and standardization of the urgent need...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.