The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article considers the architecture of an information system for automating the testing of user interfaces based on the use of Internet technologies. The general description of the system operation, the description of the main modules, the structure of the interface of the Internet resource are given.
This paper presents a series of experiments on the classification of emergency phone conversation records using artificial neural networks (ANNs). Input data which were processed by ANNs were the features of callers and events taken from emergency phone calls. The authors analyzed four variants of classification: the groups of callers which have specified features, the groups of events which have...
The emotional database can be classified as spontaneous and simulated emotions. Spontaneous emotions can be identified based on the two parameters 1) Arousal and 2) Valence values represented in a two dimensional plane. Arousal measures how calming or exciting the information is, whereas valence measures postive or negative affectivity of information. The objective of the paper is to predict the arousal...
In this paper, a hybrid broadcast broadband TV (HbbTV) test system with the automatic testing subsystem is proposed. The proposed system is based on Node.js framework with SQLite database on the backend side and Polymer framework on the front-end side. The paper covers basic testing metodology and design process with the emphasis on the implementation and testing.
Facial recognition is a challenging problem in image processing and machine learning areas. Since widespread applications of facial recognition make it a valuable research topic, this work tries to develop some new facial recognition systems that have both high recognition accuracy and fast running speed. Efforts are made to design facial recognition systems by combining different algorithms. Comparisons...
Outlier detection is a primary step in many data mining applications. An outlier is an abnormal individual from a population, which usually leads poor accuracy in models. Medical literatures are the most reliable resources for researchers to know the progress in their research areas and latest contributions from others. Traditional keyword search retrieves all the text data that contain the keywords...
The number of deaths due to the motor vehicle accidents has increased drastically during the last few years. It is estimated that nearly 40–50 % of the accidents are due to the distractions of the driver. One of the methods to assess driver distraction is using head pose estimation. The unavailability of a standard driving database hampers the study and testing of driver distraction algorithms. In...
Hadith is the second source of Islamic law after Qur'an and an explanation of verses of the Qur'an. Today, there are many hadiths that appear and that are doubtful of its authenticity. The number of hadits that are doubtful of its authenticity or so-called dhaif and maudhu hadith can lead to errors in the determination of Islamic law for everyday life. The classification of hadith is required to know...
Security concerns increase as the technology for falsification advances and biometrics provides airtight security by identifying an individual based on the physiological and/or behavioral characteristics. Physiological hidden biometrics represented by ECG biomedical signal is highly confidential, sensitive, and hard to steal and replicate, and also hold great promise to provide a more secure biometric...
Fraud, waste, and abuse in medical insurance contributes to significant increases in costs for providers and patients. One way to reduce costs is through the detection of abnormal medical practices that could indicate possible fraud. In this paper, we expand upon our previous research into medical specialty anomaly detection by validating the efficacy of our model using real-world fraud cases, and...
Case-Based Reasoning also known as CBR model has been widely used to solve the problem in various cases. This study aims to explain the implementation of K-Nearest Neighbor Algorithm in Case-Based Reasoning model. The research showed that KNN algorithm is suitable to be used in CBR model. The results of this study are to measure the accuracy level of automatic answer identity formation and search...
In the animation movie production, there is a common tool namely motion capture (mocap) to capture the motion of actors. Using this technology, reconstruction of actors motion is being mapped to drive 3D character in the animation. In the reconstruction process of human motion, there were some significant parameters that affect the quality of the result such as subtle motion and high precision reconstruction...
Synthetic Aperture Radar (SAR) image land cover classification is an important task in SAR image interpretation. Supervised learning, such as Convolutional Neural Network (CNN), demands instances which are accurately labeled. However, a large amount of accurately labeled SAR images are difficult to produce. In this paper, a Probability Transition CNN (PTCNN) is proposed for patch-level SAR image land...
Palm vein recognition is developing biometric identification technology. It can be used in physical security and information security for selective control of access to a place or resource. A palm vein recognition has been gaining research interest from last few years because it use physiological intrinsic that uniqueness, stability, not easily spoofed and damaged and have live body identification...
The aim of this research is to design an implementation of the speech recognition system to control the speed of a DC motor. The Linear Predictive Coding (LPC) method is used in the speed recognition system, tuned by the Adaptive Neuro-Fuzzy Inference Systems (ANFIS) method. There are 5 (five) samples of voice signals in Bahasa Indonesia recognized by this system, i.e.: “Nyala”, “Lambat”, “Sedang”,...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Sometimes the overlay networks for large-scale distributed middleware are constructed without considering the underlying network structure. For improving the performance, many kinds of middleware which actively control underlying network are proposed. In this case, both overlay and underlay network behavior should be tested. On the other hand, they provide different functions since they target different...
In contrast to applications relying on specialized and expensive highly-available infrastructure, the basic approach of microservice architectures to achieve fault tolerance – and finally high availability – is to modularize the software system into small, self-contained services that are connected via implementation-independent interfaces. Microservices and all dependencies are deployed into self-contained...
This paper describes a preliminary investigation of Voice Pathology Detection using Deep Neural Networks (DNN). We used voice recordings of sustained vowel /a/ produced at normal pitch from German corpus Saarbruecken Voice Database (SVD). This corpus contains voice recordings and electroglottograph signals of more than 2 000 speakers. The idea behind this experiment is the use of convolutional layers...
UML Interactions represent one of the three UML behaviors. They describe the interwork of parts of a system based on message exchange. UML Interactions can reside on any level of abstraction and they seem sufficiently elaborated for high-level specifications used for sketching the communication among parts of a system. The UML Interactions metamodel, however, reveals some deficiencies for precise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.