Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper will focus on how ICT in the classroom could really work to provide the children the education they need in this 21st century. Learning for children with the use of ICT in the classroom can work if teachers have the ability and skills to integrate ICT in their classroom. This is where the headmasters play a crucial role, if the teachers are supported by the surrounding education system...
Indian National Agricultural Research System (INARS) is one of the largest agricultural systems. In 2007, Consortium for e-Resources in Agriculture (CeRA) was established for providing access of e-Resources to INARS. Access of about 3000 e-journals has been provided to the 143 agricultural institutions/universities of INARS on IP (Internet Protocol) authentication basis through CeRA. Access of e-resources...
The information revolution particularly e-resources has changed the shape of libraries and role of librarians. The present study has been undertaken to compare the level of awareness and utilization of electronic journals (e-journals) among faculty members and research scholars (RS) of Banasthali University (BU), Rajasthan, India Further, the data is collected through a structured questionnaire distributed...
Today, search engines play a vital role in accessing the online content. However, the data in the webpages are not clearly perceived by search engines. As a result, it provides a lot of irrelevant data with little desired information. In addition, it takes a lot of time in searching the appropriate result. By studying the online educational needs of Indian school children, we aim to retrieve appropriate...
This paper investigates various emotion recognition techniques from the facial expression of human subjects. To describe human facial expressions, a number of characteristic points are extracted from input face images using active shape models (ASMs), and translated 49 scalar features so that they are invariant to scale and position changes. The scalar feature values then construct a 49-dimensional...
In this paper, we propose a two-stage phone recognition system using articulatory and spectral features. In the first stage, articulatory features are predicted from spectral features using FeedForward Neural Networks (FFNNs). In the second stage, phone recognition is carried out using the predicted articulatory features and spectral features together. FFNNs and Hidden Markov Models are explored for...
Hyperspectral face images present productive information captured using a Hyperspectral camera compared to normal RGB camera capturing face images. Hyper spectral imaging is the collecting and processing of information from across the visible electromagnetic spectrum. Hyper spectral imaging deals with the imaging of narrow spectral bands over a continuous visible spectral range, and produces the spectra...
Speech automation is becoming more popular in the recent times. Speech recognition systems are increasing day by day. Earlier the speech recognition systems were developed for English language. Now these systems are being developed for many other languages. Many languages in the globe have different speaking styles or accents. The speech recognition systems may not recognize speeches with accent other...
Several major accidents in the oil and gas industry traced their source to deficient training resulting in serious injuries and even casualties along with extremely expensive damage to equipment and decrease in productivity. This paper presents a procedure evaluation/e-training tool called PeT to track the knowledge and confidence of trainees in emergency operating procedures. PeT was tested with...
A novel incremental meta-cognitive-based Scaffolding algorithm is proposed in this paper crafted in a recurrent network based on fuzzy inference system termed recurrent classifier (rClass). rClass features a synergy between schema and scaffolding theories in the how-to-learn part, which constitute prominent learning theories of the cognitive psychology. In what-to-learn component, rClass amalgamates...
In order to utilize identification to the best extent, we need robust and fast algorithms and systems to process the data. Having palmprint as a reliable and unique characteristic of every person, we extract and use its features based on its geometry, lines and angles. There are countless ways to define measures for the recognition task. To analyze a new point of view, we extracted textural features...
The emergence of Big Data and Data Intensive Systems as specialized fields in computing is motivating the development of new courses and curricula. The biggest challenge is to define coherent and stable intended learning outcomes in a highly dynamic field. It is also necessary to balance between proper knowledge acquisition by student and the required time investment of teacher. We carefully looked...
Advances in Statistical Machine Translation (SMT) for breaking language barrier have been seen in recent years, and there is huge demand on cross-language dialog communication between people. In this paper we propose to leverage SMT for supporting cross-language dialog communication. Several techniques are applied to improve the performance on a dialog domain, including rescoring, system combination,...
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness. An investigation to determine if any differences exist between information security education, information...
The word-to-vector (W2V) technique represents words as low-dimensional continuous vectors in such a way that semantic related words are close to each other. This produces a semantic space where a word or a word collection (e.g., a document) can be well represented, and thus lends itself to a multitude of applications including document classification. Our previous study demonstrated that representations...
On the way of learning industrial design, by comparing engineering students and art students, although the former has certain advantages in the overall quality, there are also shortcomings, such as lack of art feeling/innovation and so on. Thus, majority of science and engineering students didn't keep hand-painted renderings in eyes, more are inclined to computer-aided design, ignoring the importance...
The changing environment of the information society requires new abilities and competences of the young people. The present paper introduces the course, named "Strategic Business Decisions in a Risky and Rapidly Changing Environment", which was conducted in Burgas Free University and attended by students from 6 countries in Europe. The major issues and results of the conducted course are...
Traditional research into the arts has almost always been based around the subjective judgment of human critics. The use of data mining tools to understand art has great promise as it is objective and operational. We investigate the distribution of music from around the world: geographical ethnomusicology. We cast the problem as training a machine learning program to predict the geographical origin...
Credit risk analysis plays an important role in the financial market. In this paper, discriminative restricted Boltzmann machine (RBM) is used in credit risk classification. RBM is a generative model associated with an undirected graph, which can capture complicated features from observed data, and after introducing discriminative component into RBM, it can be used to train a non-linear classifier...
Classical regression methods take vectors as covariates and estimate the corresponding vectors of regression parameters. When addressing regression problems on covariates of more complex form such as multi-dimensional arrays (i.e. Tensors), traditional computational models can be severely compromised by ultrahigh dimensionality as well as complex structure. By exploiting the special structure of tensor...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.