The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of improving the precision of speech emotion recognition, this paper proposed a novel speech emotion recognition approach based on Gaussian Kernel Nonlinear Proximal Support Vector Machine (PSVM) to recognize four basic human emotions (angry, joy, sadness, surprise). Firstly, preprocess speech signal containing sampling, quantification, pre-emphasizing, framing, adding window and endpoint...
High precision results in structural with the shortest time consumption are expected when methods are introduced to solve FEM(Finite element method). Solving of stiffness matrix assembled by isoparametric elements and solving the assembled stiffness matrix are the most time-consuming. In the previous serial algorithms, there is always a time limitation for some applications and it is hard to achieve...
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The increasing amount of data being collected from simulations, instruments and sensors creates challenges for existing e-Science infrastructure. In particular, it requires new ways of storing, distributing and processing data in order to cope with both the volume and velocity of the data. The University of Queensland has recently designed and deployed MeDiCI, a data fabric that spans the metropolitan...
Home Automation Systems have been continuously evolving in the past few years: some of the systems are focusing their attention on providing remote access and control of the system, while others are more focused on the interconnectivity of the devices and on integrating them into greater systems, like smart cities. In this paper we propose a hierarchical architecture for Home Automation Systems, which...
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Commercial quantum annealing (QA) machines are now being built with hundreds of quantum bits (qubits). These are used as analog computers, to solve optimization problems by annealing to an unknown ground state (the solution), given the Hamiltonian for that problem. We propose and develop a new approach, in which we use machine learning to do the inverse problem: to find the Hamiltonian that will produce...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
Control theory can establish properties of systems which hold with all signals within the system and hence cannot be proven by simulation. The most basic of such property is the stability of a control subsystem or the overall system. Other examples are statements on robust control performance in the face of dynamical uncertainties and disturbances in sensing and actuation. Until now these theories...
In this paper, we investigate the selling strategy and price decisions for a seller who provides two complementary products to the strategic consumer over two periods under three selling strategies: markdown pricing (MD), second period bundling (SPB) and first period bundling (FPB). It is found that the seller's optimal prices in the second period of SPB and FPB strategies are higher than that of...
While most contemporary researchers argue that Artificial Intelligence (AI) provides overwhelming and profound advancements in technology and beneficial tools used daily to advance human life on earth, there exist a host of other researchers who hold contrary opinions to this view, with regard to the rising adverse ontological and existential consequences which the products of super-intelligent technologies...
This paper presents one step toward creating the building blocks for machine intelligence that is inspired by its biological equivalent. The authors' quantum learning methods (deep quantum learning) are applied to quantum devices whose quantum bit (q-bit) activity is deliberately chosen to mimic the spiking behavior of biological neurons. Because of the "quantum" scale of these computers,...
The Computational Thinking (CT) conceptual framework is entering its second decade of research yet still lacks a cohesive definition by which the field can coalesce. The lack of clear definition makes assessment tool challenging to formulate, pedagogical efforts difficult to compare, and research difficult to synthesize. This paper looks to operationalize differing definitions of CT enhancing the...
Creating school timetables is problematic in many schools due to the complexity of models that need to be solved. If schools do not have enough resources (rooms, teachers), they are forced to work double or several shifts. This paper deals with shift types and ways to write them in formats used by computers to generate timetables automatically. Even though many schools work in shifts, the constraint...
Abstract-Cyber-bullying has recently been reported as one that causes tremendous damage to society and economy. Advances in technology related to web-document annotation and the multiplicity of the online communities renders the detection and monitoring of such cases rather difficult and very challenging. This paper describes an online system for automatic detection and monitoring of Cyber-bullying...
The tutorial aims to address electrical communications link limitations by developing chipscale, integrated photonic technology to enable seamless intrachip and off-chip photonic communications that provide the required bandwidth with low energy/bit. The emerging technology will exploit wavelength division multiplexing (WDM), allowing much higher bandwidth capacity per link, which is imperative to...
Leonid Efimovich Maistrov (1920-1982) is one of the first Russian historians of computing technology. He is the author of two classical publications, "The development of computing machines" (written in 1974 together with I. A. Apokin) and the catalog of computing machines stored in the museums, private collections, and institutions on the USSR (written in 1981 together with O.L. Petrenko)...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.