The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Previous studies have found that a significant number of bug reports are misclassified between bugs and nonbugs, and that manually classifying bug reports is a timeconsuming task. To address this problem, we propose a bug reports classification model with N-gram IDF, a theoretical extension of Inverse Document Frequency (IDF) for handling words and phrases of any length. N-gram IDF enables us to extract...
Data amount becomes rapidly increased in today's era. Data can be in form of text, picture, voice, and video. Social media is one factor of the data increase as everybody expresses, gives opinion, and even complains in social media. The first step is data collection used API twitter with each candidate names on Jakarta Governor Election. The collected data then became input for preprocessing step...
In the past twenty years, progress in intrusion detection has been steady but slow. The biggest challenge is to detect new attacks in real time. In this work, a deep learning approach for anomaly detection using a Restricted Boltzmann Machine (RBM) and a deep belief network are implemented. Our method uses a one-hidden layer RBM to perform unsupervised feature reduction. The resultant weights from...
Text classification deals with allocating a text document to a predetermined class. Generally, this involves learning about a class from representations of documents belonging to that class. In this paper, we propose a classifier combination that uses a Multinomial Naïve Bayesian (MNB) classifier along with Bayesian Networks (BN) classifier. The results of two classifiers are combined by taking an...
Software Maintenance is the crucial phase of software development lifecycle, which begins once the software has been deployed at the customer's site. It is a very broad activity and includes almost everything that is done to change the software if required, to keep it operational after its delivery at the customer's end. A lot of maintenance effort is required to change the software after it is in...
Attention Deficit Hyperactivity Disorder (ADHD) is one of the widely researched neuro-developmental disorder. This paper highlights the importance of phenotypic information in the diagnosis of ADHD, in addition to Magnetic Resonance Image (MRI) based features. In this study, features from amygdala region of the brain is extracted using region of interest based feature extraction technique. These features...
A major source of errors in fingerprint recognition systems is poor quality of fingerprints. Local quality of fingerprints plays an important role in these systems to ensure high recognition performance. Recently an improved fingerprint matching method is proposed to use minutiae information encoded by Minutia Cylinder-Code (MCC) together with cylinder quality measures as local quality measures associated...
Clinical features found in brain CT scan images are widely used in traumatic brain injury (TBI) as indicators for Glasgow Outcome Scale (GOS) prediction. However, due to the lack of automated methods to measure and quantify the CT scan image features, the computerized prediction of GOS in TBI has not been well studied. This paper introduces an automated GOS prediction system for traumatic brain CT...
Extracting main object from photos is prerequisite for image processing and semantic image understanding in many areas especially in multimedia signal processing at internet. So far, either human interaction in single image or sequence image frames are required for the extraction and most of them still rely on hand-crafted features. In contrast, the proposed work cast the human boundary detection...
In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitting and computational intelligence techniques. Based on the Generalized Gaussian Distribution (GGD) model in the quantized DCT coefficients, the errors between the logarithmic domain of the histogram of the DCT coefficients and the polynomial fitting are extracted as features to detect the adulterated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.