The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An investigation on classification of emotional speech cross different language families is proposed in this paper. Datasets on three languages, CDESD in Mandarin, Emo-DB in German, and DES in Danish are analyzed. With 2-D classifications on arousal-appraisal space, better recognition performances are observed in arousal dimension than in appraisal dimension. The classification rates in cross language...
Data warehouse is a system for collecting, organizing, holding and sharing historical data. It is used by the business users for decision support. Business users run queries in one manner or another on the data within the data warehouse environment to support their process. Hence, Data warehouse testing plays an important role in the system. Data warehouse testing comprises of exhaustive testing of...
To achieve the automotive quality for semiconductor devices represented by “zero defect”, “PAT” is actively applied to outgoing test. “PAT” has been generally used on wafer level test. This time we expanded it to package level test and established the method to detect the characteristic variations and to screen out the outliers.
Software tend to evolve over time and so does the test-suite. Regression testing is aimed at assessing that the software evolution did not compromise the working of the existing software components. However, as the software and consequently the test-suite grow in size, the execution of the entire test-suite for each new build becomes infeasible. Techniques like test-suite selection, test-suite minimisation...
While Convolutional Neural Networks (CNNs) have recently achieved impressive results on many classification tasks, it is still unclear why they perform so well and how to properly design them. In this work, we investigate the effect of the convolutional depth of a CNN on its generalization performance for binary classification problems. We prove a sufficient condition —polynomial in the depth of the...
Speech is natural vocalized and primary means of communication. Speech is easy, hand-free, fast and do not require any technical knowledge. Communicating with computer using speech is simple and comfortable way for human being. Speech recognition system made this possible. The acoustic and language model for this system are available but mostly in English language. In India there are so many peoples...
Current research of emotion recognition from electroencephalogram (EEG) signals rarely considers common patterns embodied in multiple subjects and individual patterns for each subject simultaneously. Therefore, in this paper, we propose a novel emotion recognition approach using subjects or subject groups as privileged information, which is only available during training. First, five frequency features...
The recognition system when concerned with high-security, authentication of authorized person and invalidation of an imposter is a vital task for the system. The system based on iris feature is considered as highly secure and most reliable system due to the intrinsic property of an iris. This paper presents an efficient iris recognition approach based on the fusion of modular neural network output...
ETL (Extract, Transform and Loading) is a data warehousing process that migrate the data from source database by performing certain transformation rules over the extracted data. This transformed data is loaded back to the target database. With emergence of Big Data various organization are moving toward big data technology like Hadoop, Hadoop Ecosystem Projects like Hive and HBase to store their data...
Affiliate marketing (AM) is a popular and cost-effective marketing model for e-commerce practitioners to drive visitor traffic, to their e-commerce sites. Nevertheless, this popular marketing model is associated with inherent risks and known frauds, which could have a detrimental effect on its popularisation. Many studies have been carried out to explore risks and frauds that are typically associated...
Multi-script writer identification consists in identifying a person of a given text written in one script from the samples of the same person written in another script. The rationale behind this is that the writing style of an individual remains constant across different scripts. While this hypothesis may hold, recent results on a multi-script writer identification competition show that classical...
Human age estimation is an important research topic and can find its applications in such as commodity recommendation and security monitoring. The establishment of existing estimators basically follows a same pipeline, i.e., an estimator is built from a given training dataset like FG-NET and then evaluated on a holdout testing set to determine its effectiveness. In doing so, a usually-followed assumption...
Fish recognition and identification in an underwater environment are important research topics. In this study, several real-world underwater videos were collected to construct a fish category database for further fish recognition and identification. Recently, compressive sensing, using reconstruction algorithms to reconstruct a sparse signal, has been successfully applied to face recognition. Reconstruction...
In this paper, a scheme to identify the type of script of printed documents for multi-script OCR system is presented. This scheme works on block or paragraph of the given printed document. The proposed scheme uses Wavelet features and MPEG-7 Edge Histogram Descriptor (EHD) feature applied on the wavelet coefficients at level 1 to identify the type of script. To reduce the dimension of the feature...
Identification of musical instruments from the acoustic signal using speech signal processing methods is a challenging problem. Further, whether this identification can be carried out by a single musical note, like humans are able to do, is an interesting research issue that has several potential applications in the music industry. Attempts have been made earlier using the spectral and temporal features...
In this research, we have constructed road assets management system for Surabaya, the second biggest city in Indonesia. As reported in this paper, we have managed 607 assets -comprising traffic signs, traffic lights, and road marking- which are spread out at 365 different locations. The availability of mobile apps, which are equipped with camera and Global Positioning System (GPS), allows our proposed...
Security is a worldwide issue. Individuals need their information and frameworks secure from malevolent dangers and assaults. A framework must be secured inside and out from illegal penetration. Security quality affirmation checks if the application is defenseless against assaults, in the event that anybody can hack the framework or login to the application with no approval. It is a procedure to discover...
This paper aims to bring out the interrupt driven approach, taken for the design of checkout software in a completely automated environment. The Checkout Software is used for the complete automation of spacecraft checkout operations during Integrated Spacecraft Testing (IST). The checkout operations carried out for spacecraft testing include acquisition of multiple chains of telemetry in real time,...
In this paper we propose a publicly available static hand pose database called OUHANDS and protocols for training and evaluating hand pose classification and hand detection methods. A comparison between the OUHANDS database and existing databases is given. Baseline results for both of the protocols are presented.
Published by the Combined DNA Index System (CODIS) program of the Federal Bureau of Investigation (FBI) in 1997, the 13 core short tandem repeat (STR) loci are widely adopted as genetic markers in forensic applications, e.g., identity testing and paternity testing. However, these loci may be biased and suffer from reduced sensitivities towards specific population groups. In addition, the rapid growth...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.