The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Consumption charge on electricity is one of the issues faced by dormitories, room for rent, apartment and the like. Ideally, tenants must only pay what they have used for a specific period of time, but inevitably sometimes, they pay beyond their actual use simply because of unavailability of a meter or machine that could measure their actual use individually. Due to this practice and the current scheme...
Polypharmacy in older adults has been shown to be a significant risk factor for adverse drug events. Pharmacogenomic testing provides insights regarding individual drug efficacy and may be instrumental in optimizing medication regimen. However, majority of current pharmacogenomic decision support tools provide assessment only of single drug-gene interactions without taking into account complex drug-drug...
Facial expression recognition is a very important research field to understand human emotions. Many facial expression recognition systems have been proposed in the literature over the years. Some of these methods use neural network approaches with deep architectures to address the problem. Although it seems that the facial expression recognition problem has been solved, there is a large difference...
In this paper, a text independent speaker recognition system based on Gaussian mixture models (GMM) was developed with a specific focus on the use of a voice activated detector (VAD) algorithm in the training and testing. At the training level, a modified estimation/maximization (EM) algorithm is used. It is less prone to get trapped around a local maximum and so, it will have more chance to converge...
Voice applications often require the ability to make user-friendly responses by judging the user or user-type from an extremely short utterance, such as a single word. However, it is assumed that performance becomes degraded as the utterance length decreases. In this paper, we examine the performance of speaker identification for extremely short utterances of less than two seconds and then study the...
Contrast of image plays an important role in image perception quality and is also susceptive to various factors during image acquisition process. However, only a few image quality evaluation algorithms have been focused on the contrast-changed image quality assessment (IQA), and none of these methods belongs to blind IQA algorithms. Therefore, they cannot be applied to the case when the reference...
Traditional vision-based hand gesture recognition systems is limited under dark circumstances. In this paper, we build a hand gesture recognition system based on microwave transceiver and deep learning algorithm. A Doppler radar sensor with dual receiving channels at 5.8GHz is used to acquire a big database of hand gestures signals. The received hand gesture signals are then processed with time-frequency...
In an iterative and incremental development environment software regression testing plays an important role; it helps to ensure the reliability in the building process of a software product. The optimization of a regression test depends on the size of the test suite to be executed. Regression testing helps to verify existing modifications (fixing bugs) or verify new features added to a software product...
Today there are various types of image editing tools which make totally changes in image with free of cost, Image has performed a significant role in Human life but image has easily fiddle using image processing software. Fiddle image has difficult to detect that it is original or not for this reasons the image forgery detection topic is active research work nowadays. The proposed of this paper to...
Node.js becomes increasingly popular in building server-side JavaScript applications. It adopts an event-driven model, which supports asynchronous I/O and non-deterministic event processing. This asynchrony and non-determinism can introduce intricate concurrency bugs, and leads to unpredictable behaviors. An in-depth understanding of real world concurrency bugs in Node.js applications will significantly...
Existing software analysis methods for performanceand coverage are typically tied to the source code of software applications.In this work, we extend these methods to the Graphical User Interfaces (GUI) of applications, motivated by the desire to bring the user perspective into focus of software quality assurance and testing at the GUI level. We present and discuss various profiling procedures, their...
The issues of software and hardware development are considered of data logging into systems of testing complex objects. The describes the architecture of a system for testing complex scientific-technical objects. In the list of original elements of the concept of building highly reliable, fast-reconfigurable interactive test monitoring and control systems: — using of original technology of representation...
Recently, sparse representation based classifiers (SRC) and collaborative representation based classifiers (CRC) have been shown to give very good performance under controlled scenarios. However, in practical applications, face recognition often encounters variations in illumination, expression, noise and occlusion, which cause severe performance degradation (due to the outliers in testing). In this...
The SFSVC (Super Fast Support Vector Classifier) architecture is implemented to a computational mobile platform and its performances are evaluated against its implementation on a classic machine (personal computer). The aim of this article is to prove that the SFSVC architecture can have good performances on an environment with very limited resources by taking advantages of its compact structure and...
In this paper we shall present recent results of two applications for monitoring using acoustical signal classification. The first case study is the problem of context awareness based on acoustic analysis for a service robot. Then we discussed the acoustic classification for wildlife intruder detection. Previous results are briefly recalled and new experimental results are also provided.
We propose a new method in rank level fusion for biometric identification. Our method is based on the pool adjacent violators (PAV) algorithm after the ranks have been transformed to the approximated scores. We then show that our method outperforms various approaches that commonly used in biometric rank level fusion on NIST BSSR1 multimodal database.
In this paper an advanced iris-biometric comparator is presented. In the proposed scheme an analysis of bit-error patterns produced by Hamming distance-based iris-code comparisons is performed. The lengths of sequences of horizontal consecutive mis-matching bits are measured and a frequency distribution is estimated. The difference of the extracted frequency distribution to that of an average genuine...
The performance of a biometric system gets affected by various types of errors such as systematic errors, random errors, etc. These kinds of errors usually occur due to the natural variations in the biometric traits of subjects, different testing, and comparison methodologies. Neither of these errors can be easily quantifiable by mathematical formulas. This behavior introduces an uncertainty in the...
Traditional methods of testing were based on Instrument-Centric models which included sensor and measurement capabilities inside of instruments that allowed test engineers to be able to perform measurements and collect data. Such data would then be analyzed by software to determine whether the test resulted in a pass or fail disposition. Modern technologies have significantly changed the equation...
This paper presents the new face verification algorithm based on deep convolutional neural network. The algorithm produces face feature vectors, distance between these vectors allows to determine whether images from the same class. Comparative experimental results are given for LFW test database and modern face recognition algorithms. ROC-curve and equal error rate are used to determine the accuracy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.