The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to bring in light non-intrusive speech quality assessment using Teager-Kaiser energy computation. Based on the above mentioned energy computation technique, Features in the form of cepstral coefficient are calculated and thereby, compared to the classical Mel-frequency cepstral co-efficient. The energy computation technique is vividly used in automatic speech recognition area. The...
Nowadays, data has become more important as the core resource for the information society. However, with the development of data analysis techniques, the privacy violation such as leakage of sensitive data and personal identification exposure are also increasing. Differential privacy is the technique to satisfy the requirement that any additional information should not be disclosed except information...
On the Internet, where the number of choices is overwhelming, there is need to filter, prioritize and efficiently deliver relevant information in order to alleviate the problem of information overload, which has created a potential problem to many Internet users. Recommender systems solve this problem by searching through large volume of dynamically generated information to provide users with personalized...
Palmprint is a unique and reliable biometric characteristic with high usability. Many works have been carried out on this field, during the past decades. Different algorithms and systems have been proposed and built successfully. Multispectral or hyperspectral palmprint imaging and recognition can be a potential solution to these systems because it can acquire more discriminative information for personal...
In telecommunication network systems, there are a large number of interconnected components which also contain many subcomponents. Heavy rain, thunder or other factors can cause mal-function of the components or disconnections between the components which trigger alarms. Because of the interconnection of elements, triggered alarms may propagate to other components. This creates harsh challenges to...
Popularity of social networking sites and introduction of e-commerce has led to an increase in number of multimedia resources generated every year. The growth in the number of images that are being uploaded has brought a need to develop systems that can store, process and organize them as how and when needed. A survey conducted on working ability of famous e-commerce systems has brought into light...
The ECG signal, has attracted more attention due to its importance in diagnosing conditions. Now days T-wave alternans (TWA) has been used to forecast Sudden Cardiac death (SCD). TWA is the beat-to-beat alterations changing in the T-wave amplitude. A new method is used in this paper to detect these alternans waves more exactly and quickly with heart rate calculation by RR-interval in ECG. This algorithm...
To achieve the automotive quality for semiconductor devices represented by “zero defect”, “PAT” is actively applied to outgoing test. “PAT” has been generally used on wafer level test. This time we expanded it to package level test and established the method to detect the characteristic variations and to screen out the outliers.
It has been known that SNPs are the most important types of genetic variations that can influence common diseases and phenotypes. Increasing number of SNP-phenotype related publications, demonstrate the need for an automatic extraction of this association from biomedical articles. Although few corpora have been developed for obtaining the mutation and disease from text, no corpus is available which...
This paper proposes an object verification method by using sparse representation (SR) which has been applied for object representation and recognition. However, SR dictionary does not show sufficient compactness. Our method comprises three major modules. First, we train the sparse matrix by using boost K-Singular Value Decomposition (boost K-SVD) to obtain a sparse vector set. Second, we combine two...
Inferring scene depth from a single monocular image is an essential component in several computer vision applications such as 3D modeling and robotics. This process is an ill-posed problem. To tackle this challenging problem, previous efforts have been focusing on exploiting only global or local depth aware properties. We propose a model that incorporates both of them to obtain significantly more...
GAT (Global Affine Transformation) and GPT (Global Projection Transformation) correlation matchings were successively proposed by Wakahara and Yamashita which use affine transformation (AT) and 2D projection transformation (PT), respectively, to maximize the normalized cross-correlation value between a template and a GAT/GPT-superimposed input image. In theory, to maximize the degree of matching via...
SQL injection is the most common web application vulnerability. The vulnerability can be generated unintentionally by software developer during the development phase. To ensure that all secure coding practices are adopted to prevent the vulnerability. The framework of SQL injection prevention using compiler platform and machine learning is proposed. The machine learning part will be described primarily...
By summing up the Point of Sale (POS) data of approximately 2,000 American supermarket stores from 2001 to 2012 for every company, we compared the growth rate of the POS sales data with each company's actual sales. We confirmed that the growth rate in quarterly sales for companies whose anchor products are daily necessities in the United States were strongly related to the POS data's growth rate,...
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
Differential privacy (DP) has emerged as a popular standard for privacy protection and received great attention from the research community. However, practitioners often find DP cumbersome to implement, since it requires additional protocols (e.g., for randomized response, noise addition) and changes to existing database systems. To avoid these issues we introduce Explode, a platform for differentially...
Essential proteins play a crucial role in the survival and development process of life, as they provide all available nutrients to maintain life. Therefore, many researchers pay attention to the identification of essential proteins. As experiments methods are usually costly and time-consuming, more and more computational algorithms have been developed to discover essential proteins based on biological...
Mood of music is considered as one of the most intuitive criteria for listeners, thus this work is focused on the emotional content of music and its automatic recognition. The research study presented in this work contains an attempt to music emotion recognition including audio parameterization and rough sets. A music set consisting of 154 excerpts from 10 music genres was evaluated in the listening...
Datamining is the process of extracting interesting information of patterns from large databases. One of the most important datamining task and well-researched is the association rules mining. It aims to find the interesting correlation and relations among sets of items in the transaction databases. One of the main problems related to the discovery of these associations that a decision maker faces...
Canonical Correlation Analysis (CCA) is a standard tool in statistical analysis that measures the linear relationship between two data sets. In this paper, a multi-biometric approach which combines palm print feature and palm vein feature based on Canonical Correlation Analysis is proposed. First, using a series of pre-processing and extracted the ROI (Region of interest) which has enhanced of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.