The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
Positioning applications become more popular with the advancement of location aware services. Global Positioning System is a successful solution for outdoors whereas it is not suitable for indoor environments due to the lack of line of sight for radio frequency signals. Therefore, various systems have been developed to solve the indoor positioning problem. Enhancing the performance of these systems...
Recently many industries and companies are developing machine learning algorithms and services, and they are publishing them on the internet. However, because most of people who want to use the machine learning services to analyze data are familiar with sheet data rather than programming language, it is difficult to use those services written in programming language. For the reason, we developed a...
The paper exposes the behavior of the Decision Trees (DT) algorithms on a big database with many cases and many attributes: Forest Covertype (FC) from UCI Knowledge Discovery in Databases Archive. In classification experiments considered have been taken into account 22 splitting criteria and two pruning methods whose performances were presented in terms of classification error rate on test data, data...
SVM (Support Vector Machine), a state of the art classifier model is implemented on a computational mobile platform and its performances are evaluated against a low complexity classifier such as SFSVC (Super Fast Vector Support Classifier) on the same platform. For a better comparison, similar implementation for the two architectures are considered, such as using the same basic linear algebra library...
In order to enhance the classification accuracy of the two-dimensional feature of the image, the idea of a separate classification for each projection direction feature is proposed in this paper. Our method first divides the image into blocks and finds the two-dimensional sub-projection matrix of each sub-block, and then completes the feature extraction by using each column of the projection matrix...
This paper describes a project concerning human recognition based on athlete numbers and their face detection. In daily life many people are training and participating in marathons, competitions or do sports like soccer. For that they wear t-shirts with a serial number that denotes their identity. For that detection of athlete numbers makes peoples life easier by collecting the data faster and automatically...
Sequential pattern mining is a data mining technique that aims to extract and analyze frequent subsequences from sequences of events or items with time constraint. Sequence data mining was introduced in 1995 with the well-known Apriori algorithm. The algorithm studied the transactions through time, in order to extract frequent patterns from the sequences of products related to a customer. Later, this...
The importance of data security and confidentiality increases day by day, since for most companies and organizations data remains as the most important asset. Standard database security measures like access control mechanisms, authentication and encryption technologies are of little help when it comes to preventing data theft from insiders. By incorporating intrusion detection mechanisms, we can improve...
Ethnicity is one of the most salient clues to face identity. Analysis of ethnicity-specific facial data is a challenging problem and predominantly carried out using computer-based algorithms. Current published literature focusses on the use of frontal face images. We addressed the challenge of binary (British Pakistani or other ethnicity) ethnicity classification using profile facial images. The proposed...
Global Positioning System (GPS) is one of famous technology which applied for outdoor localization. Unfortunately, GPS has lacked in accuracy while it uses in indoor environments. Fingerprint is a method enriched with lots of received signal strength. This method is used for mapping the observation area, and it is suitable for indoor application such as crowdsources tracking moving object in indoor...
Hadith is the second source of Islamic law after Qur'an and an explanation of verses of the Qur'an. Today, there are many hadiths that appear and that are doubtful of its authenticity. The number of hadits that are doubtful of its authenticity or so-called dhaif and maudhu hadith can lead to errors in the determination of Islamic law for everyday life. The classification of hadith is required to know...
Case-Based Reasoning also known as CBR model has been widely used to solve the problem in various cases. This study aims to explain the implementation of K-Nearest Neighbor Algorithm in Case-Based Reasoning model. The research showed that KNN algorithm is suitable to be used in CBR model. The results of this study are to measure the accuracy level of automatic answer identity formation and search...
Ischemic heart disease is a leading cause of death both in developed and developing countries. In this paper, efforts to detect myocardial ischemia are focused on developing a screening system through vectorcardiogram (VCG). Existing systems manifest a low accuracy, as a result of concentrating more on ST segment and statistical features of VCG. In our work, several novel strategies have been introduced,...
A huge amount of data is available to the web users with evolution of web technology. The available resources in web are used by the users and also they involve in giving feedbacks and thus generate additional information. It is very essential to explore, analyze and organize their opinions and feedbacks in an efficient way for better decision making. So sentiment analysis (SA) is used to find the...
The increasing role of spoken language interfaces in human-computer interaction applications has created conditions to facilitate a new area of research — namely recognizing the emotional state of the speaker through speech signals. This paper proposes a text independent method for emotion classification of speech signals used for the recognition of the emotional state of the speaker. Different feature...
Gait not only defines the way a person walks, but also provides interesting cues on individuals daily routine, mental state, health condition or even cognitive function. The importance of incorporating cognitive behavior and analysis in biometric systems has been noted recently. In this article, we develop a biometric-security system using gait-based skeletal information from Microsoft Kinect v1 sensor...
Automatic Target Recognition (ATR) aims at detecting the presence and at recognizing the typology and the orientation of targets within a scenario, by using an unsupervised approach. In Syntethic Aperture Radar imaging this turns to be a difficult task due to the specific characteristics of clutter and background noise. Within this manuscript a new two-steps ATR algorithm based on Kolmogorov-Smirnov...
Music emotions recognition (MER) is a challenging field of studies addressed in multiple disciplines such as musicology, cognitive science, physiology, psychology, arts and affective computing. In this paper, music emotions are classified into four types known as those of pleasing, angry, sad and relaxing. MER is formulated as a classification problem in cognitive computing where 548 dimensions of...
In the Area of Security, Intrusion Detection System (IDS) form an individual trailing and plays an essential role in information Security. As the usability of the internet among the users in a wide area is increasing day by day so as the importance of security and to keep the system aware of the malicious activities is also increasing. It has the following limitations on low detection rate, high false...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.