The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method to identify the arohana-avarohana of carnatic raga. Carnatic raga is broadly classified as melakarta (parent) and janya (child) raga. Arohana-avarohana of 10 different ragas is collected from 16 different singers. 16 audio data are collected for each raga. 11 among the 16 are used in the training phase and the remaining 5 are used for testing. The acoustic feature, MFCC...
As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation like low detection rate, high false alarm...
Activity recognition has found immense interest in the field of sports activity recognition in recent time. The application has found extensive utility in giving machine based feedback on how well the performance in training is by any sports athlete. The present work proposes a model to predict the quality of training along with the mistakes which can have a severe effect on performance of the athlete...
Test Automation saves time and cost by digitizing the process of test generation and execution. The automated test generation techniques in the literature do not always produce effective and compilable test cases. A test generation framework is proposed in this paper which uses the information extracted from UML diagrams and source code. The three layer architecture of the framework is responsible...
Telemetry package is one of the inevitable subsystems in a complex spacecraft. Telemetry (TM) data of the mainframe and payload section of the spacecraft is required to be monitored continuously throughout its life span to check the subsystems health and take appropriate decision from ground or autonomously from on-board. In various types of spacecraft like geostationary, remote sensing and interplanetary...
As the world becomes more digital, data Science is the successful study that incorporates varying techniques and theories from distinct fields. Among all fields, the domain knowledge might be the most important since all data science researchers need to start with the domain problem, and end with useful information within the domain. Identifying new application domain is always considered as fundamental...
Recent rapid development of computer technology has introduced a data explosion challenge. In addition, data mining and multi agent techniques are known as a very popular approach for dealing with complex datasets. Such a hybrid approach can be considered as an effective approach for the development of intelligent decision support systems in health domain. In this paper we propose an improved data...
The Content-Based Image Retrieval (CBIR) techniques comprise methodologies intended to retrieve self-content descriptors over the image data set being studied according to the type of the image. The main purpose of CBIR consists in classifying images avoiding the use of manual labels related to understanding of the image by the human being vision. In this work we provide a new CBIR procedure which...
Wireless monitoring system is the effective and convenient tools in medical field nowadays. It is widely applied to many physiological parameters such as Electrocardiogram (ECG), Electroencephalogram (EEG), etc. This paper proposes a low cost wireless 1-lead ECG monitoring system that transmits the information to the database server via the mobile network. Our designing system consists of the ECG...
In this article we present our first approach in using Passive Testing (used in protocol and software conformance checking) and Process Mining (used in enterprise workflow analysis) techniques for analyzing DNS operation traces.
This paper presents the results of the analysis of the network intrusion detection systems using data mining techniques and anomaly detection. Anomaly detection technique is present for a while in the area of data mining. Previous papers that implement data mining techniques to detect anomaly attacks actually use well-known techniques such as classification or clustering. Anomaly detection technique...
Imbalanced data-set Classification has become a hotspot problem in Data Mining. The essential assumption of the traditional classification algorithms is that the distribution of the classes is balanced, therefore the algorithms used in Imbalanced data-set Classification cannot achieve an ideal effect. In view of imbalance date-set classification, we propose an over sampling method based on support...
In recent years, adaptive learning systems rely increasingly on concept maps to customize the educational logic developed in their courses. Most approaches do not take into account the possibility of combining the concept maps predefined by experts of field and those developed automatically using the Fuzzy Sets Theory. In this article, we present a hybrid approach using on the one hand the feedback...
The Polish State Fire Service gathers information about incidents which require their intervention. This information is stored to document the events. However, it can be very useful for new officers training, better identification of threats and planning of more effective procedures. The identification of key risk factors for casualties among firefighters, children or other involved people was a topic...
Software Testing is a very important phase in the cycle of software development. It is the only phase which ensures the reliability on the software. Generally 40–50% of the software development cost is spent on this phase. Though many automatic testing tools are present, but still most research is required in this field to reduce cost and time allotted for this phase. Test Oracle is a process which...
Applying visual analytics to large software systems can help users comprehend the wealth of information produced by source repository mining. One concept of interest is the co-evolution of test code with source code, or how source and test files develop together over time. For example, understanding how the testing pace compares to the development pace can help test managers gauge the effectiveness...
As a software project ages, its source code is modified to add new features, restructure existing ones, and fix defects. These source code changes often induce changes in the build system, i.e., the system that specifies how source code is translated into deliverables. However, since developers are often not familiar with the complex and occasionally archaic technologies used to specify build systems,...
Understanding how to properly use APIs of large libraries is difficult, error prone, and time consuming. Software developers resort to study to learn APIs. Several approaches have been proposed to mine these examples, but the sources from which they mine examples as well as their mining approaches hamper their applicability in some practical scenarios. Unit test cases seem to be an additional source...
Recently, with wide use of computer systems, internet, and rapid growth of computer networks, the problem of intrusion detection in network security has become an important issue of concern. In this regard, various intrusion detection systems have been developed for using misuse detection and anomaly detection methodologies. These systems try to improve detection rates of variation in attack types...
Sensing technologies have made the tracking of users' daily trajectories a common service, such as location based service, children/elders tracking service, etc. This information can also be analyzed to discover some interesting and meaningful information about users. In this paper, we study the Routine Based Classification (RBC) approach for classifying users into different groups. For comparing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.