The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
In order to enhance the classification accuracy of the two-dimensional feature of the image, the idea of a separate classification for each projection direction feature is proposed in this paper. Our method first divides the image into blocks and finds the two-dimensional sub-projection matrix of each sub-block, and then completes the feature extraction by using each column of the projection matrix...
This paper describes a project concerning human recognition based on athlete numbers and their face detection. In daily life many people are training and participating in marathons, competitions or do sports like soccer. For that they wear t-shirts with a serial number that denotes their identity. For that detection of athlete numbers makes peoples life easier by collecting the data faster and automatically...
Ethnicity is one of the most salient clues to face identity. Analysis of ethnicity-specific facial data is a challenging problem and predominantly carried out using computer-based algorithms. Current published literature focusses on the use of frontal face images. We addressed the challenge of binary (British Pakistani or other ethnicity) ethnicity classification using profile facial images. The proposed...
Ischemic heart disease is a leading cause of death both in developed and developing countries. In this paper, efforts to detect myocardial ischemia are focused on developing a screening system through vectorcardiogram (VCG). Existing systems manifest a low accuracy, as a result of concentrating more on ST segment and statistical features of VCG. In our work, several novel strategies have been introduced,...
A huge amount of data is available to the web users with evolution of web technology. The available resources in web are used by the users and also they involve in giving feedbacks and thus generate additional information. It is very essential to explore, analyze and organize their opinions and feedbacks in an efficient way for better decision making. So sentiment analysis (SA) is used to find the...
The increasing role of spoken language interfaces in human-computer interaction applications has created conditions to facilitate a new area of research — namely recognizing the emotional state of the speaker through speech signals. This paper proposes a text independent method for emotion classification of speech signals used for the recognition of the emotional state of the speaker. Different feature...
Gait not only defines the way a person walks, but also provides interesting cues on individuals daily routine, mental state, health condition or even cognitive function. The importance of incorporating cognitive behavior and analysis in biometric systems has been noted recently. In this article, we develop a biometric-security system using gait-based skeletal information from Microsoft Kinect v1 sensor...
Automatic Target Recognition (ATR) aims at detecting the presence and at recognizing the typology and the orientation of targets within a scenario, by using an unsupervised approach. In Syntethic Aperture Radar imaging this turns to be a difficult task due to the specific characteristics of clutter and background noise. Within this manuscript a new two-steps ATR algorithm based on Kolmogorov-Smirnov...
Music emotions recognition (MER) is a challenging field of studies addressed in multiple disciplines such as musicology, cognitive science, physiology, psychology, arts and affective computing. In this paper, music emotions are classified into four types known as those of pleasing, angry, sad and relaxing. MER is formulated as a classification problem in cognitive computing where 548 dimensions of...
We consider a particular paradigm of steganalysis, called universal blind steganalysis, namely, no knowledge of the steganographic way and all knowledge of the cover-source. Its goal is to detect all known (already existing) and unknown (previously unseen) steganographic algorithms in such a paradigm. However, the existing approaches can not achieve overall good performance on both known and unknown...
Dimensionality reduction of feature vector size plays a vital role in enhancing the text processing capabilities; it aims in reducing the size of the feature vector used in the mining tasks (classification, clustering… etc.). This paper proposes an efficient approach to be used in reducing the size of the feature vector for web text document classification process. This approach is based on using...
Classification is a central problem in the fields of data mining and machine learning. Using a training set of labeled instances, the task is to build a model (classifier) that can be used to predict the class of new unlabelled instances. Data preparation is crucial to the data mining process, and its focus is to improve the fitness of the training data for the learning algorithms to produce more...
Humans are trying to interact with the computer via touch screen, smart-phones, audio and video. A computer get information from the human via an interface and likewise, a human recognize an information from the computer via an interface. Facial expression recognition is a key element in a human communication. In order to promote the man and machine interaction, a framework is proposed for the facial...
Face recognition using sketches plays a major role in the field of forensic investigation and the field is considered to be more challenging domain for research work. The sketch forms a visual representation of a face and it can be utilized in many recognition applications for instance in facial expression recognition, retrieval of face, in the field of law enforcement and sketch-to-photo recognition...
The high dimension and large computational complexity are shortcomings of feature extraction in multi-level histogram sequence local binary pattern (M-HSLBP). In order to overcome those problems, a face recognition algorithm based on the combination of multi-level histogram sequence center-symmetric local binary pattern (M-HCSLBP) and Fisherface is proposed in this paper. First, CS-LBP algorithm is...
After “9.11” terrorist attacks, more advanced information technologies have been developed to counter terrorism domain to enhance the performance of early warning system. Machine learning based data mining can be applied to predict terrorist event hidden in terrorist attack events and by which the experts expect to get a clear picture of what the terrorists are thinking about in order to step up defense...
Brain is a vital part of our body, without brain can't perform any task. Human beings are termed as an intelligence because of the unique properties of the human brain. When we want to do any activity, it generates the signals. On the basis of brain signal our body act accordingly. The signal pattern of brain to give the instruction to the organs is varies person to person. Therefore, by using single...
In recent years, there has been significant work in effective recognition of human facial expression. In this paper, we consider a new method for facial expression recognition, based on structural differences. The differences are regulated based on comprehensive laws for every expression. This article uses the Fuzzy Nero algorithm to classify support machines that have close fuzzy separation. With...
It is very difficult, if not impossible, to obtain a clean reference signal of a noisy speech recorded in a practical environment. As a result, intrusive methods that evaluate the quality of speech signal with the help of a clean reference signal has little value in real world applications. In this paper, we investigate the effectiveness of data-driven non-intrusive method for assessing quality of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.