The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deep convolutional neural networks (DCNN's) have shown great value in approaching highly challenging problems in image classification. Based on the successes of DCNNs in scene classification and object detection and localization it is natural to consider whether they would be effective for much simpler computer vision tasks. Our work involves the application of a DCNN to the relatively simple task...
Library Automation and Digital Archive (Lontar) is a liblary information system developed by Universitas Indonesia and used by its main library. Rapid increase of library collections will soon make query performance of current SQL DBMS, which is MySQL, not fast enough to satisfy users and need to be complemented by NoSQL database, an emerging technology that specially developed for managing big data...
For the lacking of inspection method, the transportation data standards are compiled weakly in the process of transportation information system developing, which increases the difficulty of data sharing and exchange. In order to improve the conformance of data with the standards of transportation information systems, a method named “data standard conformance inspection” is proposed in this paper....
This paper develops a Linear Discriminant Analysis based face recognition system in the Discrete Cosine Transform (DCT) domain as a departure from the traditional analysis in the spatial domain. In the training mode, the truncated DCT coefficients are used to find discriminating features for all the subjects in the image database. The compact representation of the truncated DCT coefficients leads...
Information and data are increasing and has rapid growth as we now are in big data era. Database management system becomes a major part of data centers. This paper compared the performance of an open source database management system between MySQL and MariaDB. The testing environment is Xen 4.4 virtual machine using OLTP-Simple and OLTP-Seats as the benchmark data. Our experiment results show that...
In the conventional frame feature based music genre classification methods, the audio data is represented by independent frames and the sequential nature of audio is totally ignored. If the sequential knowledge is well modeled and combined, the classification performance can be significantly improved. The long short-term memory(LSTM) recurrent neural network (RNN) which uses a set of special memory...
In this paper, a pathological voice dataset (PVD) is introduced. The dataset contains recordings of 14 speakers (9 female and 5male) and two health states: normal and unhealthy. Each speaker pronounces fixed words, prompted digits, reads sentences and gives free talking. These materials cover all the phonemes in Chinese. The dataset also considerate the channel variability and is recorded through...
Many speech emotion recognition approaches have been presented in recent years, and most of them assume that emotional speech utterances in training and testing corpora are collected under the same conditions. However, in many real applications, this assumption does not hold as the training data and testing data are often obtained from different scenarios, e.g., ages, noises, languages. To address...
In this paper, we present a system to recognize text in traffic signs, along with its context based recognition result corrections that we developed. This system detects text in traffic signs region using contour detection and using KNN Classifier to recognize letters in it. The result of the recognitions that may contain errors will be corrected using Forward Reverse Dictionary that has Contextual...
While there are many commercial Extraction, Transformation and Loading (ETL) platforms that facilitate fast and easy development of ETL applications, ETL testing is largely a manual process. In order to allow frequent releases of reliable ETL applications, an automated regression testing approach is needed. This paper presents 1TH, one such test harness tool and a methodology for agile ETL development...
There are many "continuous" practices in software engineering, for example continuous integration (CI), continuous delivery (CD), continuous release (CR), and DevOps. However, the maintenance aspect of continuity is rarely mentioned in publication or education. The continuous practices and applications depend on many repositories and artifacts, such as databases, servers, virtual machines,...
Mutation testing is a well-known method for measuring a test suite's quality. However, due to its computational expense and intrinsic difficulties (e.g., detecting equivalent mutants and potentially checking a mutant's status for each test), mutation testing is often challenging to practically use. To control the computational cost of mutation testing, many reduction strategies have been proposed...
We propose a Convolutional Neural Network model to learn spatial footstep features end-to-end from a floor sensor system for biometric applications. Our model's generalization performance is assessed by independent validation and evaluation datasets from the largest footstep database to date, containing nearly 20,000 footstep signals from 127 users. We report footstep recognition performance as Equal...
Low cost RGB-D cameras are gaining significant popularity in surveillance scenarios. While RGB images contain good quality discriminative information, depth images captured in uncontrolled environment at a distance does not provide accurate depth map. In this research, we present a learning based reconstruction and mapping algorithm to generate a feature rich representation from the RGB images. These...
Vortex-Induced Vibrations (VIV) is a ubiquitous phenomenon caused by shedding vortices behind bluff bodies. VIV induced by ocean currents and waves generates fatigue damage in riser systems. This disturbance creates a big challenge for designing ocean exploration systems. A key feature in determining VIV is the shape and size of the bluff bodies. Therefore, a new design shape, riser section with buoyancy...
In the learning process, it is important to analyze the answers given by the assessed persons at the knowledge-check tests. In this matter, an important component is the comparison of the given answers and the correct ones by measuring the similarity between them. This paper proposes to present a modality of measuring the similarity degree between answers given by learners at the questions from within...
The estimated accuracy of an algorithm is the most important element of the typical biometrics research publication. Comparisons between algorithms are commonly made based on estimated accuracies reported in different publications. However, even when the same dataset is used in two publications, there is a very low frequency of the publications using the same protocol for estimating algorithm accuracy...
Face spoofing can be performed in a variety of ways such as replay attack, print attack, and mask attack to deceive an automated recognition algorithm. To mitigate the effect of spoofing attempts, face anti-spoofing approaches aim to distinguish between genuine samples and spoofed samples. The focus of this paper is to detect spoofing attempts via Haralick texture features. The proposed algorithm...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.